Aim : To bypass a wireless network and document the same. Requirements



Download 12.35 Kb.
Date16.12.2020
Size12.35 Kb.
#54533
Aim

Aim : To bypass a wireless network and document the same.
Requirements :
pc, or a laptop, wireless router
Description : Hacking is art of exploiting any found vulnerabilities pertaining to hardware or

software by applying necessary skills and tools. Using the acquired knowledge to cause damage or steal any kind of information is considered as unethical hacking and on the contrary aiding in protecting from such malicious activities with prior consent is termed as ethical hacking. Wi-Fi hacking is the procedure of bypassing the security protocols and gaining access for defamatory purposes. Such activities are usually carried out by a Black hat hacker. Attackers usually perform an information gathering before launching the actual attack to precisely identify the vulnerabilities present with the target. This preliminary phase is called as reconnaissance. A wireless network is nearly vulnerable either due to poor authentication configuration or due to its inherent security protocols. The next step is to assesses all the possible vulnerabilities associated with the network. This is the vulnerability assessment phase.
Download 12.35 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2024
send message

    Main page