Wi-Fi Snippets
- Authentication Cracking: 4-Way Handshake Crack
- Authentication Cracking: EAP Relay Attack
- Authentication Cracking: Overview
- Authentication Cracking: PMKID
- Authentication Cracking: WPS
- Client Attacks: Captive Portal
- Client Attacks: DNS & ARP Poisoning
- Client Attacks: JS Injection
- Client Attacks: NetNTLM Hash Stealing
- EAP-PEAP Handshake
- Wi-Fi Handshaking (Enterprise Networks)
- Hacker Devices: Wi-Fi Pineapple
- Hacker Devices: Wi-Fi Coconut
- Hacker Devices: Wi-Fi USB Rubber Ducky
- Hacker Devices: O.MG Charging Cable
- Wi-Fi Handshaking (PSK Personal Networks)
- Known Beacons
- Rogue AP/Evil Twin Overview
- KARMA/MANA
- Captive Portal
- Wi-Fi Monitoring Overview
- WiGLE Database
- Defining the Wireless Security Problem
- Wi-Fi Handshaking
- Denial of Service (DoS)
Excerpt From wi-fi vulnerabilities part 1 Webinar
Find Out More on Wi-Fi Handshaking by CTO Dr. Brett Walkenhorst.
CTO Dr. Brett Walkenhorst explains the process of establishing a connection in wireless networks, focusing on the sequence of events from discovery to data transmission. In the video below, he describes the steps involved in authentication and association between a client and an access point and the additional complexities in enterprise networks.