Wireless Attacks and Penetration Testing (part 3 of 3) | |
From: | Joe Klemmer |
Date: | Sat, 14 Aug 2004 10:18:51 -0400 |
Wireless Attacks and Penetration Testing (part 3 of 3) by Jonathan Hassell last updated July 26, 2004 In the previous two installments (part one, part two) of this series, I've discussed the types of attacks your wireless network is subject to see and some techniques you can use to pen-test your WLAN. In this final part, I'll look at ways to mitigate the risks I've outlined in the previous parts of the article and spend a bit of time looking at some proposed solutions currently in front of the IETF. http://www.securityfocus.com/infocus/1792