官术网_书友最值得收藏!

Chapter 3. Bypassing WLAN Authentication

A false sense of security is worse than being insecure, as you may not be prepared to face the eventuality of being hacked.

WLANs can have weak authentication schemas that can be easily broken and bypassed. In this chapter, we will take a look at the various basic authentication schemas used in WLANs and learn how to beat them.

In this chapter, we will take a look at the following topics:

  • Uncovering hidden SSIDs
  • Beating MAC filters
  • Bypassing Open Authentication
  • Bypassing Shared Key Authentication (SKA)
主站蜘蛛池模板: 峨山| 安阳市| 安图县| 历史| 泗水县| 景东| 饶河县| 新兴县| 台南市| 马山县| 平阴县| 尼木县| 昌黎县| 荔浦县| 汾西县| 象山县| 齐齐哈尔市| 宜都市| 神农架林区| 高青县| 宁城县| 收藏| 兴宁市| 寿阳县| 三台县| 安远县| 崇明县| 镇安县| 封开县| 吴江市| 北票市| 广东省| 丽江市| 鄂伦春自治旗| 澄江县| 龙南县| 安远县| 西贡区| 抚州市| 宜都市| 开远市|