{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

CEH.V6.-.Module.20.Hacking.Wireless.Networks

CEH.V6.-.Module.20.Hacking.Wireless.Networks - Ethical...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethical Hacking and Countermeasures Version 6 Module XX Hacking Wireless Networks
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Scenario Clients of Xbrokerage Inc. are furious. None of them are able to logon to its portal. Xbrokerage had recently introduced this portal as an add-on service through which clients could track their shares and trade online. Being a customer-friendly firm, Xbrokerage allowed wireless access within its office i premises. Are wireless networks more prone to attacks? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited What could have been a vulnerable point?
Background image of page 2
News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.journalnow.com/
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Security News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.theregister.co.uk/
Background image of page 4
Module Objective This module will familiarize you with : • Concept of Wireless Networking • Effects of Wireless Attacks on Business • Types of Wireless Networks • Wireless Standards Wireless Standards • Antennas • Wireless Access Points • SSID • Setting up a WLAN • Detecting a Wireless Network • How to Access a WLAN • Wired Equivalent Privacy • Wi-Fi Protected Access St f H ki Wi l N t k • Steps for Hacking Wireless Networks • Cracking WEP • Tools for Scanning • Tools for Sniffing • Securing Wireless Networks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • WIDZ and RADIUS
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Module Flow SSID Steps for Hacking Wireless Networks Wireless Networking Business and Wireless Attacks Setting up a WLAN Cracking WEP Types of Wireless Networks Scanning Tools Detecting a Wireless Network Wireless Standards How to Access a WLAN Sniffing Tools WEP Wi l A Antennas Securing Wireless Networks WIDZ d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Wireless Access Points WPA WIDZ and RADIUS
Background image of page 6
Introduction to Wireless EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Introduction to Wireless Networking Wireless networking technology is becoming increasingly l d h i h i d d l popular and at the same time has introduced several security issues The popularity of wireless technology is driven by two primary factors: convenience and cost A Wireless Local Area Network (WLAN) allows workers to access digital resources without being locked to their desks Laptops can be carried to meetings, or even to Starbucks, d d i l k Thi i h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited and connected to a wireless network. This convenience has become more affordable
Background image of page 8
Wired Network vs. Wireless Network Wired networks offer more and better security options than wireless More thoroughly established standards with wired networks Wireless networks are much more equipment-dependent than wired networks
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}