{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

CEH.V6.-.Module.20.Hacking.Wireless.Networks

CEH.V6.-.Module.20.Hacking.Wireless.Networks - Ethical...

Info icon This preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethical Hacking and Countermeasures Version 6 Module XX Hacking Wireless Networks
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Scenario Clients of Xbrokerage Inc. are furious. None of them are able to logon to its portal. Xbrokerage had recently introduced this portal as an add-on service through which clients could track their shares and trade online. Being a customer-friendly firm, Xbrokerage allowed wireless access within its office i premises. Are wireless networks more prone to attacks? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited What could have been a vulnerable point?
Image of page 2
News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.journalnow.com/
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Security News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.theregister.co.uk/
Image of page 4
Module Objective This module will familiarize you with : • Concept of Wireless Networking • Effects of Wireless Attacks on Business • Types of Wireless Networks • Wireless Standards Wireless Standards • Antennas • Wireless Access Points • SSID • Setting up a WLAN • Detecting a Wireless Network • How to Access a WLAN • Wired Equivalent Privacy • Wi-Fi Protected Access St f H ki Wi l N t k • Steps for Hacking Wireless Networks • Cracking WEP • Tools for Scanning • Tools for Sniffing • Securing Wireless Networks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • WIDZ and RADIUS
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Module Flow SSID Steps for Hacking Wireless Networks Wireless Networking Business and Wireless Attacks Setting up a WLAN Cracking WEP Types of Wireless Networks Scanning Tools Detecting a Wireless Network Wireless Standards How to Access a WLAN Sniffing Tools WEP Wi l A Antennas Securing Wireless Networks WIDZ d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Wireless Access Points WPA WIDZ and RADIUS
Image of page 6
Introduction to Wireless EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Introduction to Wireless Networking Wireless networking technology is becoming increasingly l d h i h i d d l popular and at the same time has introduced several security issues The popularity of wireless technology is driven by two primary factors: convenience and cost A Wireless Local Area Network (WLAN) allows workers to access digital resources without being locked to their desks Laptops can be carried to meetings, or even to Starbucks, d d i l k Thi i h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited and connected to a wireless network. This convenience has become more affordable
Image of page 8
Wired Network vs. Wireless Network Wired networks offer more and better security options than wireless More thoroughly established standards with wired networks Wireless networks are much more equipment-dependent than wired networks
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern