Examine common wireless hacking threats like exploitation of poorly configured devices, deployment of Rogue, Evil Twin and honeypot APs, and MAC filter bypass.
Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
- recognize common threats against wireless networks like exploiting poorly configured devices, deploying Rogue APs, Evil Twin APs, Ad-hoc connections, and honeypot APs
- recognize more complex wire network attacks such as MAC filter bypass by MAC spoofing and revealing hidden wireless networks
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.