Hacking Wireless Networks
SKILLSET
To penetrate or reconfigure WLANs in ways unintended by developers and designers.
Related Questions
- Since a WPS PIN has an effective size of 7 digits (the eighth is for checksum), it has 10,000,000 possibilities. This makes WPS safe against attackers.
- Bluetooth is a Personal Area Network (PAN) wireless technology described by which IEEE Standard?
- The amount of power emitted by the wireless antenna is called EIRP. Here, EIRP is __________.
- WPA and WPA2 always work on the same key generation mechanism and the same attack on password selection works on both.
- Which of the following are types of wireless attacks that can occur?
- What security solutions use the same key for both encryption and authentication?
- Which of these attacks try to take advantage of buggy WiFi drivers using buffer overflow to execute arbitrary codes?
- Which of the following is an advantage of WiFi compared to a wired (Ethernet) connection?
- What are two advantages to using RADIUS for Wi-Fi Security?
- Jerry wants to create an internal wireless network that makes the use of end to end TLS for the purpose of security. Which of these would allow for this?