Abstract

Security controls are implemented to secure wireless networks, minimizing the ability of an attacker to gain access. These access controls can be used independently or combined to provide additional protection. The access controls depend on the type of wireless access point configuring. Most access points allow the configuration of encryption and Media Access Control (MAC) filtering. Many managers and system administrators never bother to learn the techniques hackers use to attack wireless networks. A negative stigma is often associated with the use of hacker tools and methodologies. They frequently consider the use of these tools as the legitimization of hacker-based tactics and strategies. This attitude can lead to an insecure wireless network that has not been tested to determine the ability to prevent a true attack from succeeding. Conducting penetration tests to determine the security of the wireless infrastructure is essential. Through the practice of learning, understanding, and implementing the same methods of attack the intruder will use, one can better assess vulnerabilities, overcome weaknesses, and fortify defenses. During a wireless penetration test, it is important to gather as much information about the network as possible. Most networks are discovered during war driving, so the attack may be targeted more towards a wireless vulnerability than a specific corporate network.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call