...law so use it at your own risk. See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Overview ● We're going to learn how WiFi (802.11) works ● Start with terminology ● Types ● Vulnerabilities ● Attacking them ● Surprise demonstration of....:) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● AP - Access Point MAC – Media Access Control a unique id assigned to wireless adapters and routers. It comes in hexadecimal format (ie 00:11:ef:22:a3:6a) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● BSSID – Access Point's MAC Address ESSID - Access Point’s Broadcast name. (ie linksys, default, belkin etc) Some AP’s will not broadcast their name,But Airodump-ng can guess it. See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Gear - Antennas Dipole – Standar, Omni directional ● Hyperbolic – Mushroom Shaped signal ● Yaggi – Very directional (Japanese R&D) ● Pringles – Improvised(Hacker Style) Yaggi ● WindSurfer – Improvised hyperbolic ● See-Security Mar 04 2013 – Wireless...
Words: 2941 - Pages: 12
...law so use it at your own risk. See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Overview ● We're going to learn how WiFi (802.11) works ● Start with terminology ● Types ● Vulnerabilities ● Attacking them ● Surprise demonstration of....:) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● AP - Access Point MAC – Media Access Control a unique id assigned to wireless adapters and routers. It comes in hexadecimal format (ie 00:11:ef:22:a3:6a) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● BSSID – Access Point's MAC Address ESSID - Access Point’s Broadcast name. (ie linksys, default, belkin etc) Some AP’s will not broadcast their name,But Airodump-ng can guess it. See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Gear - Antennas Dipole – Standar, Omni directional ● Hyperbolic – Mushroom Shaped signal ● Yaggi – Very directional (Japanese R&D) ● Pringles – Improvised(Hacker Style) Yaggi ● WindSurfer – Improvised hyperbolic ● See-Security Mar 04 2013 – Wireless...
Words: 2941 - Pages: 12
...R UC TURE: THE IN T E R N E T AN D THE WO R L D W I D E WEB LEARNING OBJECTIVES In this chapter, you will learn about: ● The origin, growth, and current structure of the Internet ● How packet-switched networks are combined to form the Internet ● How Internet protocols and Internet addressing work ● The history and use of markup languages on the Web, including SGML, HTML, and XML ● How HTML tags and links work on the World Wide Web ● The differences among internets, intranets, and extranets ● Options for connecting to the Internet, including cost and bandwidth factors ● Internet2 and the Semantic Web INTRODUCTION Many business executives made the statement “the Internet changes everything” during the late 1990s. One of the first people to say those words publicly was John Chambers, CEO of Cisco Systems, in a speech at a computer industry trade show in 1996. For his company, the Internet did indeed change 36865_02 10/7/2005 16:35:28 Page 52 everything. Cisco, founded in 1984, grew rapidly to become one of the largest and most profitable 52 companies in the world by 2000. Cisco designs, manufactures, and sells computer networking devices. In this chapter, you will learn about these devices and how they make up the Internet. Cisco’s earnings grew as telecommunications companies purchased the company’s products to build the infrastructure of the Internet. Other companies also wanted to connect their business...
Words: 24308 - Pages: 98
...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...
Words: 214717 - Pages: 859