About Me
- Name: SWeidner
- Location: Elk Point, South Dakota, United States
My Blogger Code
B5 d+ t k s u- f- i- o- x-- e l- c (decode it!)
My Geek Code
GAT/IT d-(+) s+(): a C+++$ ULC+++>$ P++>++++ L++$>++++ !E W++>$ N+ !o !K w+()@ !O !M- !V PS-(--)@>--- PE+ Y-- PGP>++ t+ !5(-) X+ !R- tv-(+)? b+ DI++++ D++>$ G e+>++ h----(-) r+++ y++++
Links
Blogmap
AdSense
Archives
Steve's random ramblings and technical notes
Tuesday, August 31, 2004
Wireless Attacks and Penetration Testing
SecurityFocus HOME Infocus: Wireless Attacks and Penetration Testing (part 1 of 3)
Three part series on penetration testing for wireless networks. The first installment details many common styles of attacks against wireless networks, introduces WEP key-cracking, and discusses some recent developments in wireless security.
Wireless Attacks and Penetration Testing (part 2 of 3)
In this installment, the author focuses on a cracker attempting to penetrate your network and hack one of the servers held therein.
Wireless Attacks and Penetration Testing (part 3 of 3)
In this final part, the author looks at ways to mitigate the risks outlined in the previous parts of the article and spends a bit of time looking at some proposed solutions currently in front of the IETF.
Three part series on penetration testing for wireless networks. The first installment details many common styles of attacks against wireless networks, introduces WEP key-cracking, and discusses some recent developments in wireless security.
Wireless Attacks and Penetration Testing (part 2 of 3)
In this installment, the author focuses on a cracker attempting to penetrate your network and hack one of the servers held therein.
Wireless Attacks and Penetration Testing (part 3 of 3)
In this final part, the author looks at ways to mitigate the risks outlined in the previous parts of the article and spends a bit of time looking at some proposed solutions currently in front of the IETF.