Download presentation
Presentation is loading. Please wait.
Published byPaul Griffin Modified over 8 years ago
2
Houses In businesses Local institutions
3
WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams) WPA – Wifi Protection Access - User Authentication via Mac Addresses -Temporary Key Integrity Protocol (TKIP) WPA 2 – Wifi Protection Access version 2 -Advanced Encryption Standard (AES) -Counter Mode with Cipher Blocking Chain Message Authentication Code (CCMP)
4
Aircrack-ng coWPatty AirSnort WEPCrack Ethereal Cain and Able
6
Attacking Through Software Airsnare IP scanning Transfer of Malware (Malicious Software) Router Control Keylogging Mirroring Connecting via Remote Desktop Connection Software
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.