11.07.2015 Views

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cracking ExploitsWEP protocolvulnerabilitiesEarly WEPcracking toolLEAP,WPA-PSKvulnerabilityWPA-PSKcracking tool20012002Increasingsophistication ofWEP cracking tools2003 2004PEAP misconfigPTW attack vulnerabilityCafé Latte TKIP exploit2005 2006 20072008WEP WPA WPA2For more information on cracking exploits:http://www.airtightnetworks.com/home/resources/knowledge-center/wep.htmlhttp://www.shmoocon.org/2008/videos.html (Look for PEAP Pwned Extensible Authentication …)http://www.airtightnetworks.com/home/resources/knowledge-center/wpawpa2-tkip-exploit.htmlCopyright 2009, <strong>AirTight</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!