Table of Contents:
Preface.....................................................................................................1
Chapter 1: Wireless Lab Setup ...............................................................7
Chapter 2: WLAN and Its Inherent Insecurities ....................................23
Chapter 3: Bypassing WLAN Authentication .......................................51
Chapter 4: WLAN Encryption Flaws ....................................................73
Chapter 5: Attacks on the WLAN Infrastructure ...................................101
Chapter 6: Attacking the Client ..............................................................117
Chapter 7: Advanced WLAN Attacks ....................................................141
Chapter 8: Attacking WPA-Enterprise and RADIUS .............................163
Chapter 9: WLAN Penetration Testing Methodology ............................179
Appendix A: Conclusion and Road Ahead .............................................193
Appendix B: Pop Quiz Answers .............................................................199
Index ........................................................................................................203
Download or Buy Now on Amazon