In this video, explore the principles of authentication and de-authentication in WEP, WPA, and WPA2 security standards. Additionally, explore network association, de-association, and explore MAC filtering and its limitations.
- [Instructor] Early wireless networks didn't employ … encryption and were known as open networks, … however, this meant that anyone could attach to the network, … which had some significant risks. … The first and most obvious is that this leads … to additional local network traffic, … and also potentially consumption of internet bandwidth … and data allowance. … A malicious attacker can use an open network … as a launching point for attacks on other systems, … so ensuring that any traceback … and blame stops at the network they've accessed. … Even more maliciously, however, … being on the local network allows an attacker … to use techniques such as app spoofing … to attack network clients directly with exploits … and through man-in-the-middle attacks. … Security was first deployed on wireless systems in the form … of the Wired Equivalent Privacy, or WEP. … This was integrated into the 802.11b standard … and was designed to protect wireless networks … to the same extent that wired networks were protected. …
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic Wi-Fi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things