iDefense Labs - Hacking The Invisible Network - Download ebook
written by Priyan
at Friday, December 5, 2008
Book info:
Hacking the Invisible Network: Insecurities in 802.11x
by Michael Sutton
iDEFENSE Labs Publications
Several reports have discussed weakness in the Wired Equivalent Privacy (WEP) algorithm employed by 802.11x standard to encrypt wireless data. This has lead to development of automated tools, such as AirSnort and WEPCrack, that automate recovery of encryption keys. This document addresses how to find the vulnerablilities inherent in WEP algorithm, how to determine if a WLAN is vulnerable using freeware tools and most importantly how to best secure WLANs.
Download Link
Hacking the Invisible Network: Insecurities in 802.11x
by Michael Sutton
iDEFENSE Labs Publications
Several reports have discussed weakness in the Wired Equivalent Privacy (WEP) algorithm employed by 802.11x standard to encrypt wireless data. This has lead to development of automated tools, such as AirSnort and WEPCrack, that automate recovery of encryption keys. This document addresses how to find the vulnerablilities inherent in WEP algorithm, how to determine if a WLAN is vulnerable using freeware tools and most importantly how to best secure WLANs.
Download Link