Key Words
IEEE 802.11, wireless spoofing, cracking WEP, forged
Deauthentication, rogue/ Trojan access points, session hijacking, war driving.
Abstract
This article describes IEEE 802.11-specific hacking
techniques that attackers have used, and suggests various defensive measures.
We describe sniffing, spoofing and probing in the context of wireless
networks. We describe how SSIDs can be
determined, how a sufficiently large number of frames...