WPS Attacks – CompTIA Security+ SY0-401: 3.4
If you can’t break the encryption, maybe you can break down the door. In this video, you’ll learn about a significant security flaw in wireless devices that use WPS.
If you can’t break the encryption, maybe you can break down the door. In this video, you’ll learn about a significant security flaw in wireless devices that use WPS.
An encryption technology doesn’t have to suffer from a cryptographic flaw to be susceptible to attack. In this video, you’ll learn how an encryption protocol as strong as WPA can be successfully hacked.
Flaws in WEP encryption were exploited using a series of replays and very specific cryptographic attacks. In this video, you’ll learn the process that the bad guys used to break WEP encryption.
Wireless Replay and WEP Attacks – CompTIA Security+ SY0-401: 3.4 Read More »
Our mobile devices are used for communication, entertainment, and now for near-field applications. In this video, you’ll learn about near field communication and how this may change our perspective on mobile security.
Near Field Communication – CompTIA Security+ SY0-401: 3.4 Read More »
There’s a wealth of data hidden in the packets that traverse our wireless networks. In this video, you’ll learn how easy it is to perform wireless packet analysis and what you can do to protect yourself on a wireless network.
Wireless Packet Analysis – CompTIA Security+ SY0-401: 3.4 Read More »
Many encryption methods use initialization vectors to provide additional randomization to the data. In this video, you’ll learn how a poorly implemented initialization vector created an enormous security concern for our wireless networks.
Wireless IV Attacks – CompTIA Security+ SY0-401: 3.4 Read More »
We rely on Bluetooth networks to connect our mobile device to headphones, speakers, and other devices, but is a Bluetooth network really safe? In this video, you’ll learn about the security concerns surrounding bluejacking and bluesnarfing.
Bluejacking and Bluesnarfing – CompTIA Security+ SY0-401: 3.4 Read More »
We’ve rapidly moved from chalk-based wireless network identification to completely automated wireless maps. In this video, you’ll learn about the history of warchalking and how today’s wireless crowdsourced mapping is accomplished.
Wardriving and Warchalking – CompTIA Security+ SY0-401: 3.4 Read More »
Our wireless networks are only as good as the signal it provides. In this video, you’ll learn how the bad guys are disrupting our wireless infrastructure to help them gain access to our network.
Wireless Interference – CompTIA Security+ SY0-401: 3.4 Read More »
One rogue access point can create a significant security issue. In this video, you’ll learn about rogue access points, evil twins, and how to protect yourself from these security concerns.
Rogue Access Points and Evil Twins – CompTIA Security+ SY0-401: 3.4 Read More »