Chapter 2. WLAN and Its Inherent Insecurities

Nothing great can be built on a weak foundation, and in our context, nothing secure can be built on something that is inherently insecure.
WLANs, by design, have certain insecurities that are relatively easy to exploit, for example, by packet spoofing, packet injection, and sniffing (this could even happen from far away). We will explore these flaws in this chapter.
In this chapter, we shall look at the following:
- Revisiting WLAN frames
- Different frame types and subtypes
- Using Wireshark to sniff management, control, and data frames
- Sniffing data packets for a given wireless network
- Injecting packets into a given wireless network
Let's get started!
推薦閱讀
- Spring 5.0 By Example
- 自制編譯器
- Visual C++串口通信開發(fā)入門與編程實踐
- Java 9 Programming Blueprints
- 數(shù)據(jù)結(jié)構(gòu)習(xí)題精解(C語言實現(xiàn)+微課視頻)
- 新手學(xué)Visual C# 2008程序設(shè)計
- Wireshark Network Security
- Visual Basic程序設(shè)計教程
- JavaScript by Example
- SSM輕量級框架應(yīng)用實戰(zhàn)
- Getting Started with Python and Raspberry Pi
- C#面向?qū)ο蟪绦蛟O(shè)計(第2版)
- MongoDB Administrator’s Guide
- 啊哈C語言!:邏輯的挑戰(zhàn)(修訂版)
- ASP.NET jQuery Cookbook(Second Edition)