Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment by Mohd Sohaib

Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment by Mohd Sohaib

Author:Mohd Sohaib [Sohaib, Mohd]
Language: eng
Format: epub, pdf
ISBN: 9789391392161
Publisher: BPB Publications
Published: 2022-06-15T00:00:00+00:00


Figure 13.1: Wireless Network

However, with all the ease bundled, a significant caveat of wireless networks – the communication media; air. If not configured properly and secured adequately, the wireless networks can be the weakest link in your security infrastructure. A few problems that arise due to the “wireless” nature of the communications are as follows:

Packet capture: Unlike the wired networks, where an attacker has to physically access the network interfaces to connect, a wired network allows for capture, modification, and injection of data packets over the air.

Misconfiguration: It is sometimes quite difficult to secure a wireless network due to a wide variety of devices connecting to it. While trying the one-size-fits-all approach, these networks often work on master configurations. The network administrators usually lack expertise in all the protocols and device configurations, resulting in missed hardening or misconfigurations.

Coverage area: Although the fact that wireless networks can be connected independent of wired access points is a great advantage, a major drawback is the signal traversal over a wide area. If not checked, the range of wireless networks might not be limited to the physical confinement of the facilities and be available in nearby areas for attackers to try their hands on.

Spoofing: Due to a lack of physical connection, it becomes easy for an attacker to spoof an access point and trick the victim into joining a malicious network rather than the originally intended network.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9757)
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide by Eric McLeroy(5835)
The KCNA Book by Nigel Poulton(4081)
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 by Dwayne Natwick(3443)
Designing and Implementing Microsoft Azure Networking Solutions by David Okeyode(3340)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart and Joe Anich(3301)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart & Joe Anich(3205)
TCP IP by Todd Lammle(2959)
Microsoft Power BI Data Analyst Certification Guide by Ed Corcoran Orrin Edenfield(2909)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2508)
Unity Certified Programmer: Exam Guide by Philip Walker(2387)
Networking A Beginner's Guide by Bruce Hallberg(2194)
Microsoft Power Platform Solution Architect's Handbook by Hugo Herrera(2014)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1847)
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102) by Ian Neil and Mark Birch(1771)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(1656)
PHP 7 Zend Certification Study Guide by Andrew Beak(1630)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1538)
CompTIA A+ Certification Guide (220-901 and 220-902) by Matthew Bennett(1515)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(1472)