Summary

In this chapter, we explored different ways to compromise the security of the Wireless LAN infrastructure:

  • Compromising default accounts and credentials on access points
  • Denial of service attacks
  • Evil twins and MAC Spoofing
  • Rogue access points in the enterprise network

In the next chapter, we will take a look at different attacks on the wireless LAN client. Interestingly, most administrators feel that the client has no security problems to worry about. We will see how nothing could be furthers from the truth.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.9.236