Choosing the Right Wireless Card
The subject of wireless cards and chipsets is important. Although in many cases the chipset on the card and the
Read moreIT Security
The subject of wireless cards and chipsets is important. Although in many cases the chipset on the card and the
Read moreIn order to attack, you must first find a target, and though site surveys can make this easier, they cannot
Read moreSomething else you should be aware of when talking about wireless networks is the type of antenna in use. If
Read moreWhen you are authenticating clients to a wireless network, two processes are available. The first, known as open system authentication,
Read moreTA B L E – Common wireless terms
Read moreNot all wireless standards are the same, and you should become familiar with the differences and similarities of each. TA
Read moreSession hijacking relies, in part, on many of the prerequisites needed to successfully sniff a network. For instance, session hijacking
Read moreNetwork-level session hijacking is a hijacking method that focuses on exploiting a TCP/IP connection after initialization or authentication has occurred.
Read moreSession hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the
Read more