Chapter 3. Bypassing WLAN Authentication

A false sense of security is worse than being insecure, as you may not be prepared to face the eventuality of being hacked.
WLANs can have weak authentication schemas that can be easily broken and bypassed. In this chapter, we will take a look at the various basic authentication schemas used in WLANs and learn how to beat them.
In this chapter, we will take a look at the following topics:
- Uncovering hidden SSIDs
- Beating MAC filters
- Bypassing Open Authentication
- Bypassing Shared Key Authentication (SKA)
推薦閱讀
- 演進(jìn)式架構(gòu)(原書第2版)
- DBA攻堅(jiān)指南:左手Oracle,右手MySQL
- 解構(gòu)產(chǎn)品經(jīng)理:互聯(lián)網(wǎng)產(chǎn)品策劃入門寶典
- The Android Game Developer's Handbook
- Oracle Exadata性能優(yōu)化
- Magento 1.8 Development Cookbook
- Troubleshooting PostgreSQL
- Java 9模塊化開發(fā):核心原則與實(shí)踐
- C語言程序設(shè)計(jì)同步訓(xùn)練與上機(jī)指導(dǎo)(第三版)
- 大模型RAG實(shí)戰(zhàn):RAG原理、應(yīng)用與系統(tǒng)構(gòu)建
- Mastering Android Development with Kotlin
- WordPress 4.0 Site Blueprints(Second Edition)
- Unity 2018 Shaders and Effects Cookbook
- C++ Application Development with Code:Blocks
- 單片機(jī)原理及應(yīng)用技術(shù)