Hacking Wireless Networks
SKILLSET
To penetrate or reconfigure WLANs in ways unintended by developers and designers.
Related Questions
- In Ad Hoc wireless mode, all STAs assume responsibility for "beaconing."
- What wireless specification supports a transmission rate of up 54mbps at 5Ghz?
- As an ethical hacker, John is pen-testing his client's wifi. John has sniffed a victim's wireless parameters (Mac address, EESID/BSSID, channel numbers), and now he wants to send DEAUTH request to the victim with the spoofed source address of the client's AP. Which tool does he need to use for deauthentication?
- Which two features did WPAv1 add to address the inherent weaknesses found in WEP? (Choose two)
- It takes a maximum of _____ guesses to determine the correct PRGA for a specific byte.
- The biggest reason why an injection attack fails, is because of lack of ______ with the access point.
- Which of the following algorithms are deprecated according to IEEE? i) WEP-40 and/or ii) WEP-104
- The ______ factor tells Aircrack-ng how broadly to brute force key spaces (during WEP cracking using FMS attack).
- WPA Enterprise uses a _______ server for AAA.
- Since a WPS PIN has an effective size of 7 digits (the eighth is for checksum), it has 10,000,000 possibilities. This makes WPS safe against attackers.