English | Size: 177.26 MB
Genre: eLearning
Learn about exploiting wireless networks, including protocols and weak points as well as an overview of mobile devices.
Wireless networks provide many new opportunities in convenience … and exploitation. Two videos take you through the fundamentals of attacking wireless networks, beginning with a close look at Wi-Fi authentication and the weak points at each stage of the process. We examine the cracks in Wired Equivalency Privacy (WEP) and its successors, Wi-Fi Protected Access (WPA) and WPA2, as well as the tools and techniques used to break into them. An overview and comparison of key security mobile security device features introduces you to malware for mobile devices, rooting and jailbreaking, the dangers of Bring-Your-Own-Device (BYOD) policies and potential legal concerns for both the company and the pentester.
nitroflare.com/view/7590A5AF0D4C71B/Infosec-Attacking-Wireless-Networks.17.7.rar
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9