802.11 Wireless Attacks & Detection/Defense
802.11 Wireless Attacks & Detection/Defense
Table of Contents
1.
802.11 overview
2.
Link layer
3.
MAC header
4.
AUTH frame
5.
DEAUTH frame
6.
802.1x
7.
802.11i
8.
Attacks
9.
O/S/M Vulnerabilities
10.
WEP Encryption
11.
Passive Attacks
12.
Active Attacks
13.
IV Replay Attack
14.
Bit-flipping Attack
15.
MITM Attack
16.
Cisco LEAP
17.
LEAP weaknesses
18.
LEAP attack
19.
WPA PSK attacks
20.
Detection
21.
MAC anomalies
22.
MITM detection
23.
Frame injection
24.
Defense
25.
Disabling SSID
26.
AP modifications
27.
Best practice
28.
EAP selection
29.
Conclusion
30.
References
31.
Questions & Answers
32.
Thanks!
Copyright © 2005 Pavol Lupták, ICZ a.s.