Reader small image

You're reading from  Mastering Kali Linux Wireless Pentesting

Product typeBook
Published inFeb 2016
Publisher
ISBN-139781785285561
Edition1st Edition
Right arrow
Authors (2):
Brian Sak
Brian Sak
author image
Brian Sak

Brian Sak, CCIE #14441 (Security), is a 20-year information security veteran who currently works as a technical solutions architect for Cisco Systems. At Cisco Systems, he is engaged in solution development, and he consults with Cisco partners to help them build and improve their processes and services in the areas of big data analytics and digitization. Prior to joining Cisco Systems, Brian performed security consulting, penetration testing, and security assessment services for large financial institutions, US government agencies, and enterprises in the Fortune 500. In addition to numerous security and industry certifications, he has a bachelor's of science degree in information technology, with an emphasis on information security, and a master's of science degree in information security and assurance. He is also a contributor to The Center for Internet Security and other publications by Packt and Cisco Press.
Read more about Brian Sak

Jilumudi Raghu Ram
Jilumudi Raghu Ram
author image
Jilumudi Raghu Ram

Jilumudi Raghu Ram is a security analyst with over 5 years of experience in the information security domain, with a strong knowledge of incident response, digital forensics, network security, infrastructure penetration testing, and Secure configuration audits. He has conducted security audits for more than 70 networks, both internal and external, re-audits, secure configuration reviews, and server audits (Linux and Windows) for various organizations. One of his major clients has been the Government of India, where his team was responsible for conducting penetration testing assignments for various government bodies, as well as preparing vulnerability assessment and penetration testing reports, and supporting the clients to fix those vulnerabilities. Raghu Ram's areas of expertise include incident response, digital forensics, threat research, penetration testing, vulnerability assessment, dynamic malware analysis, intrusion detection systems, and security operations monitoring. Raghu Ram has written various articles related to information security in the Hindu Group magazine Frontline. He also maintains his own website dedicated to Penetration Testing - www.wirelesspentest.com
Read more about Jilumudi Raghu Ram

View More author details
Right arrow

Overview of different wireless security protocols


Wireless security protocols have developed over time to move the protection and encryption of wireless transmission to the network and remove the bulk of this responsibility from users. Wired Equivalent Privacy (WEP) was initially introduced by the IEEE to create a baseline security standard for wireless networks. In the years following its release, it was often a target of hackers who reduced the time required to compromise WEP-encrypted networks to mere seconds. WEP has been considered obsolete for many years now, and it is rare to run into it during a security assessment. In response to the failure of WEP, Wi-Fi Protected Access (WPA) was created. WPA is an implementation of the IEEE 802.11i standard. Temporal Key Integrity Protocol (TKIP) was introduced in WPA to overcome the drawbacks in WEP. Wi-Fi Protected Access II (WPA2) is a full implementation of the IEEE 802.11i standard that is more secure than both the earlier protocols. WPA2...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Mastering Kali Linux Wireless Pentesting
Published in: Feb 2016Publisher: ISBN-13: 9781785285561

Authors (2)

author image
Brian Sak

Brian Sak, CCIE #14441 (Security), is a 20-year information security veteran who currently works as a technical solutions architect for Cisco Systems. At Cisco Systems, he is engaged in solution development, and he consults with Cisco partners to help them build and improve their processes and services in the areas of big data analytics and digitization. Prior to joining Cisco Systems, Brian performed security consulting, penetration testing, and security assessment services for large financial institutions, US government agencies, and enterprises in the Fortune 500. In addition to numerous security and industry certifications, he has a bachelor's of science degree in information technology, with an emphasis on information security, and a master's of science degree in information security and assurance. He is also a contributor to The Center for Internet Security and other publications by Packt and Cisco Press.
Read more about Brian Sak

author image
Jilumudi Raghu Ram

Jilumudi Raghu Ram is a security analyst with over 5 years of experience in the information security domain, with a strong knowledge of incident response, digital forensics, network security, infrastructure penetration testing, and Secure configuration audits. He has conducted security audits for more than 70 networks, both internal and external, re-audits, secure configuration reviews, and server audits (Linux and Windows) for various organizations. One of his major clients has been the Government of India, where his team was responsible for conducting penetration testing assignments for various government bodies, as well as preparing vulnerability assessment and penetration testing reports, and supporting the clients to fix those vulnerabilities. Raghu Ram's areas of expertise include incident response, digital forensics, threat research, penetration testing, vulnerability assessment, dynamic malware analysis, intrusion detection systems, and security operations monitoring. Raghu Ram has written various articles related to information security in the Hindu Group magazine Frontline. He also maintains his own website dedicated to Penetration Testing - www.wirelesspentest.com
Read more about Jilumudi Raghu Ram