Previous Page
Next Page

SUMMARY

This chapter covered the myriad attacks against WEP-protected networks. It also covered ways to bypass the security through obscurity features that many networks employ today. Details on specific tools were covered (aircrack and jc-wepcrack, among others).

Attacks that are not related to breaking WEP were also covered. These include setting up rogue APs and denial of service attacks. Finally, all the other oddball techniques and tools related to hacking wireless networks were covered as well, including getting a copy of the WEP or WPA key from a Windows box and bypassing captive portals by tunneling over DNS or ICMP.


Previous Page
Next Page