Saturday, November 24, 2012

Hacking Wireless Networks – Chapter 11


This chapter is a synopsis of wireless technology and network standards. It also covers some tools attackers use to gain access to wireless networks. The text begins with explaining the fundamentals of wireless technology and its components. As complex as it may seem there are a few basic elements which are:
  • Wireless network interface cards (WNIC). Which transmit and receive wireless signals and (Aps) which are the bridge between wired and wireless networks.
  • Wireless networking protocols such as Wi-Fi protected access (WPA)
  • A portion of the RF spectrum which replaces wire as the connection medium.

The next few sections cover the following wireless network standards:
  • 802.11 standard
  • Basic architecture of 802.11
  • IEEE 802.11 standards
  • 802.1x standard
  • 802.15 standard
  • 802.16

 User authentication is important and usually is used in combination with wireless encryption standards to ensure that access to a wireless local area network (WLAN) is authorized.

Hacking a wireless network isn’t much different from hacking a local area network. Virtually the same port-scanning and enumeration tools can be used on wireless networks that are used on wire line.  

I found this chapter to be a good resource for wireless network connectivity. It walked you through the various parts of the system, how wireless networks work, and even how to safeguard your system. It was also interesting to note the various potential assaults attackers use to gain access to one’s computer. 

No comments:

Post a Comment