Excerpt From wi-fi vulnerabilities part 2 Webinar
CTO Dr. Brett Walkenhorst Discusses Wi-Fi Handshaking (PSK Personal Networks).
Attackers frequently aim to evade or compromise the first handshaking protocol in Wi-Fi networks. True authorization takes place during the 4-way handshake, even though it is commonly perceived as an authentication technique. CTO Dr. Brett Walkenhorst gives a summary of this procedure in relation to personal Wi-Fi networks using pre-shared keys in the video clip below.
UPCOMING REPORT: The Need for Wireless Airspace Defense
Get early access