Contents.
Chapter 1: Wireless Lab Setup.
Chapter 2: WLAN and its Inherent Insecurities.
Chapter 3: Bypassing WLAN Authentication.
Chapter 4: WLAN Encryption Flaws.
Chapter 5: Attacks on the WLAN Infrastructure.
Chapter 6: Attacking the Client.
Chapter 7: Advanced WLAN Attacks.
Chapter 8: Attacking WPA-Enterprise and RADIUS.
Chapter 9: WLAN Penetration Testing Methodology.
No comments:
Post a Comment