Wireless Network Security (With Tutorial Video)
Attack - Defense - Analysis
As wireless communications have increased in internet access, portable devices have also begun to be used more comfortably. Thus, people have started to use wireless networks to provide access to the internet with their phones, computers and tablets wherever they go.
The increase in the number of wireless networks open to the service of users and the ease of access to these networks have also become the target of attackers. This means that attackers are now able to be on the same network with their targeted users without the need for attack methods such as obtaining passwords or opening a fake access point.
In addition to all these, we are starting to see wireless communications in smart devices as well. We see wireless communications at many points in our house, clock, smart lock, object tracking devices, RFID cards we use for access purposes, and the controls we use to open our car.
This book touches not only on wireless networks used for internet access, but also on wireless network technologies of Internet of Things (IoT) devices. In this book, you will also find copying the signals of cars, hacking smart locks, copying RFID cards used in access. The purpose of this book is to focus entirely on the security and hacking methods of wireless communications.
INGREDIENTS
Aircrack-ng Family and Detailed Descriptions
Cryptology in Wireless Networks
Communication in Wireless Networks and Important Wireless Network Packages
About Wireshark
Gathering Information About Wireless Networks
DOS Attacks on Wireless Networks
Fake Wireless Networks
Methods of Bypassing Wireless Networks
Obtaining Password of WPA/WPA2-PSK Protected Networks
WPA / WPA2 Attack with PMKID
Attacks on WPA2 Enterprise Networks
RFID Hacking
BLE (Bluetooth Low Energy) Hacking
Obtaining WEP Password
Decrypting WEP and WPA Packages
Attacks on WPS Supported Wireless Networks
In-depth Wireless Network Analysis with Scapy
Security Recommendations for Wireless Networks