Book Image

Hacking For Dummies - Sixth Edition

By : Kevin Beaver
Book Image

Hacking For Dummies - Sixth Edition

By: Kevin Beaver

Overview of this book

In order to outsmart a hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this book helps you learn how to recognize the vulnerabilities in your systems and protect them from attacks. You’ll learn the security testing techniques that are based on the information security best practices. You’ll learn how to establish a comprehensive testing plan and plug the holes in your system. The later chapters will teach you how to manage an ongoing security testing program. By the end of the book, you’ll have the knowledge to successfully implement a security assessment program, perform proper security checks, and put the proper countermeasures in place to keep external hackers and malicious users in check.
Table of Contents (15 chapters)
Free Chapter
About the Author
Advertisement Page
Connect with Dummies
End User License Agreement

Chapter 10

Wireless Networks


check Understanding the risks of wireless networks

check Selecting wireless network hacking tools

check Cracking wireless encryption

check Minimizing wireless network risks

Wireless local area networks (or Wi-Fi) — specifically, the ones based on the IEEE 802.11 standard — are deployed in many business and home network. Wi-Fi was the poster child for weak security and network attacks since the inception of 802.11. The stigma of unsecure Wi-Fi is starting to wane, but now isn’t the time to lower your defenses.

Wi-Fi offers a ton of business value, from convenience to reduced network deployment time. Whether or not your organization allows wireless network access, you probably have it, so testing for Wi-Fi security vulnerabilities is critical.

In this chapter, I cover some common wireless network security...