Summary

Hacking is a complex endeavor. This chapter has attempted to bring together many of the book’s tools and concepts into an instructive example. As you can see in this chapter, our test network has several holes through which a hacker can walk. This is why security is paramount in a wireless setting.

A secure WLAN might have several layers of protection. For example, if a WLAN uses a firewall, VPN, WEP, and RADIUS, a hacker will be hard pressed to breach the network without stealing a laptop or mobile device that already has access to the WLAN—and even then, the hacker would need the user account information. This is why we always recommend layered security. Your wireless network deserves nothing less.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset