802.11 Wireless Attacks
802.11 Wireless Attacks
Table of Contents
1.
802.11
2.
Link layer
3.
MAC header
4.
AUTH frame
5.
DEAUTH frame
6.
802.1x
7.
802.11i
8.
Attacks
9.
O/S/M Vulnerabilities
10.
WEP Encryption
11.
Passive Attacks
12.
Active Attacks
13.
IV Reply Attack
14.
Bit-flipping Attack
15.
ManInTheMiddle
16.
MITM Attack
17.
Cisco LEAP
18.
LEAP weaknesses
19.
LEAP attack
20.
ICV issue
21.
Passive WPA PSK
22.
WPA PSK attacks
23.
PSK attack tools
24.
Conclusion
25.
References
26.
Questions & Answers
27.
Thanks!
Copyright © 2005 Pavol Lupták, OpenWeekend 2005