11.07.2015 Views

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

MisassociationsPolicyBypassedWiPhishing,Evil Twin,HoneypotInternetAccess Policy Policy violation• Gmail, IM, banned websites, bannedcontent MIM attack• Password stealing, data interception• Growing number of hack tools:KARMETASPLOIT, SSLstrip, AirbaseCopyright 2009, <strong>AirTight</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!