This course is ideal for penetration testers, security enthusiasts and network administrators. A non-exhaustive list of topics to be taught includes: Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise[…]
Tag: Wi-Fi
2016
23
Oct
End
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|