Danh mục

Module XV Hacking Wireless Networks

Số trang: 70      Loại file: pdf      Dung lượng: 1.52 MB      Lượt xem: 7      Lượt tải: 0    
tailieu_vip

Xem trước 7 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

Ethical HackingVersion 5Module XV Hacking Wireless NetworksModule ObjectiveThis module will familiarize you with the following:Concept of Wireless Networking Effects of Wireless Attacks on Business Types of Wireless Networks Wireless Standards Antennas Wireless Access Points SSID Setting up a WLAN Detecting a Wireless NetworkEC-CouncilHow to Access a WLAN Wired Equivalent Privacy Wi-Fi Protected Access Steps for Hacking Wireless Networks Cracking WEP Tools for Scanning Tools for Sniffing Securing Wireless Networks WIDZ and RADIUSCopyright © by EC-Council All Rights reserved. Reproduction is strictly prohibitedModule FlowWireless Networking Business and Wireless Attacks Types of Wireless Networks SSID Steps for Hacking Wireless NetworksSetting up a...
Nội dung trích xuất từ tài liệu:
Module XV Hacking Wireless NetworksEthical HackingVersion 5Module XVHacking Wireless Networks Module Objective This module will familiarize you with the following: Concept of Wireless How to Access a WLAN Networking Wired Equivalent Privacy Effects of Wireless Attacks on Wi-Fi Protected Access Business Steps for Hacking Wireless Types of Wireless Networks Networks Wireless Standards Cracking WEP Antennas Tools for Scanning Wireless Access Points Tools for Sniffing SSID Securing Wireless Networks Setting up a WLAN WIDZ and RADIUS Detecting a Wireless Network Copyright © by EC-CouncilEC-Council All Rights reserved. Reproduction is strictly prohibited Module Flow Steps for Hacking Wireless Networking SSID Wireless Networks Business and Setting up a WLAN Cracking WEP Wireless Attacks Types of Wireless Detecting Scanning Tools Networks a Wireless Network How to Wireless Standards Sniffing Tools Access a WLAN Securing Antennas WEP Wireless Networks WIDZ and Wireless Access WPA Points RADIUS Copyright © by EC-CouncilEC-Council All Rights reserved. Reproduction is strictly prohibited Introduction to Wireless Networking Wireless networking technology is becoming increasingly popular and at the same time has introduced several security issues The popularity of wireless technology is driven by two primary factors: convenience and cost A Wireless Local Area Network (WLAN) allows workers to access digital resources without being locked to their desks Laptops can be carried to meetings, or even to Starbucks, and connected to a wireless network. This convenience has become more affordable Copyright © by EC-CouncilEC-Council All Rights reserved. Reproduction is strictly prohibited Wired Network vs. Wireless Network Wired networks offer more and better security options than wireless More thoroughly established standards with wired networks Wireless networks are much more equipment-dependent than wired networks Easier to implement security policies on wired networks Copyright © by EC-CouncilEC-Council All Rights reserved. Reproduction is strictly prohibited Effects of Wireless Attacks on Business As more and more firms adopt wireless networks, security becomes more crucial Business is at high risk from whackers (wireless hackers) who do not require physical entry into a business network to hack, but can easily compromise the network with the help of freely available tools Warchalking, Wardriving, and Warflying are some of the ways in which a whacker can assess the vulnerability of a firm’s network Copyright © by EC-CouncilEC-Council All Rights reserved. Reproduction is strictly prohibited Types of Wireless Network There are four basic types: • Peer-to-Peer • Extension to a wired network • Multiple access points • LAN-to-LAN wireless network Copyright © by EC-CouncilEC-Council All Rights reserved. Reproduction is strictly prohibited Advantages and Disadvantages of a Wireless Network Disadvantages are: Advantages are: • Mobility (insecure) • Mobility (easy) • High cost post- implementation • Cost-effective in the • No physical initial phase protection of networks • Easy connection • Hacking has become • Different ways to more convenient transmit data • Risk of data sharing is high • Easy sharing Copyright © by EC-CouncilEC-Council All Rights reserved. Reproduction is strictly prohibited Wireless Standards T ...

Tài liệu được xem nhiều: