Wireless Pentesting Part 1 – An Overview

Viewing 3 reply threads
  • Author
    • #172458
      Phillip Wylie

      EH-Net - Wylie - Wireless Pentesting Part 1 – An OverviewAs networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices and apps, IoT (Internet of Things), wireless networks and the human element via social engineering have become more attractive targets for threat actors. Each of these targets are large enough subjects for books themselves, but in this article series we are going to focus on wireless network attacks. Although there are numerous types of wireless technologies such as Bluetooth, LTE and NFC, this series will cover wireless networks or WLANs (Wireless Local Area Network) using WiFi technology. In this four-part series on wireless pentesting we are going to discuss the following;

      • Part 1 – An Overview
      • Part 2 – Building a Rig
      • Part 3 – Common Wireless Attacks
      • Part 4 – Performing an Actual Wireless Pentest

      [See the full article at: Wireless Pentesting Part 1 – An Overview]

    • #176332

      Typically, guest networks are used to allow non-employees including customers and guests to have access to the Internet, cookie clicker game

    • #178126

      I’ve created a guest network for security, but even small games like bubble shooter are cutting off the internet.

    • #179585

      It is in the best interest of the whole world that a hacker is ethical. He’s like a Robin Hood. I wish I was such a hacker. basketball legends unblocked

Viewing 3 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?