The Concise Guide to Certified Ethical Hacker Exam - version 8 by Alasdair Gilchrist

The Concise Guide to Certified Ethical Hacker Exam - version 8 by Alasdair Gilchrist

Author:Alasdair Gilchrist [Gilchrist, Alasdair]
Language: eng
Format: azw3, mobi, epub, pdf
Publisher: RG Consulting
Published: 2015-02-10T00:00:00+00:00


Other attacks can fall under the following categories:

Access Control Attacks

Integrity Attacks

Confidentiality Attacks

Availability Attacks

Authentication Attacks

Rogue Access Point Attack

Client Miss-association

Miss-configured Access Point Attack

Unauthorized Association

Ad Hoc Connection Attack

Honey Spot Access Point Attack

AP MAC Spoofing

Denial-of-Service Attack

Jamming Signal Attack

Wi-Fi Jamming Devices

Wireless Threats

Evil twins –this is a technique where you set up an access point to masquerade as a legitimate AP but with higher power. Clients will authenticate and associate with the highest power AP.

Anonymous Attacks – faking a genuine users IP and MAC address

Miss-configuration – allowing access beyond the company's boundaries

Rogue access point – unauthorized access points

Ad-hoc networks – peer to peer networks set up for convenience

Denial of service attacks – flooding the spectrum



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.