802.11 Wireless Attacks & Detection/Defense
802.11 overview
Attacks
O/S/M Vulnerabilities
WEP Encryption
Passive Attacks
Active Attacks
IV Replay Attack
Bit-flipping Attack
MITM Attack
Cisco LEAP
LEAP weaknesses
LEAP attack
WPA PSK attacks
Detection
Defense
Conclusion
Attacks
9.
O/S/M Vulnerabilities
10.
WEP Encryption
11.
Passive Attacks
12.
Active Attacks
13.
IV Replay Attack
14.
Bit-flipping Attack
15.
MITM Attack
16.
Cisco LEAP
17.
LEAP weaknesses
18.
LEAP attack
19.
WPA PSK attacks
Copyright © 2005 Pavol Lupták, ICZ a.s.