This video discusses the principles of authentication and de-authentication in WEP, WPA and WPA2 security standards. Network association, network de-association, and mac filtering and its limitations are also discussed.
- View Offline
- [Narrator] Early wireless networks…didn't employ encryption, and were known as open networks.…However, this meant that anyone could attach to the network,…which had some significant risks.…The first and most obvious, is that this leads…to additional local network traffic,…and also potentially consumption of internet bandwidth…and data allowance.…A malicious attacker can use an open network…as a launching point for attacks on other systems.…So ensuring that any traceback, and blame,…stops at the network they've accessed.…
Even more maliciously however,…being on the local network allows an attacker…to use techniques such as ARP spoofing,…to attack network clients directly with exploits,…and through man-in-the-middle attacks.…Security was first deployed on wireless systems…in the form of the Wired Equivalent Privacy, or WEP.…This was integrated into the 802.11b standard,…and was designed to protect wireless networks…to the same extent that wired networks were protected.…In particular, WEP was designed…to defeat simple eavesdropping,…
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic WiFi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things