
The origional set of protections from the wi-fi Alliance designed to address both encryption and authentication

#DOCUMENTATION ON BLUEJACKING PORTABLE#
Searching for wireless signals from an automobile or on foot using a portable computing device Process of documenting and advertising the location of wireless LANs for others to use The alphanumeric user-supplied network name of a WLANĪn in-depth examination and analysis of a wireless LAN site

Intentionally flooding the radio frequency spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurringĪn unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks

The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicatingĪn EAP method designed to simplify the deployment of 802.1x by using microsoft Windows logins and passwords
#DOCUMENTATION ON BLUEJACKING BLUETOOTH#
An attack that sends unsolicited messages to Bluetooth-enabled devicesĪttack that accesses unauthorized info from a wireless device through a Bluetooth connectionĪ wireless technology that uses short range radio frequency transmissions and provides rapid ad hoc device pairingsĪn infrastructure that is used on public access WLANs to provide a higher degree of securityĪ weak authentication protocol that has been replaced by the EAPĮncryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AESĪn AP setup by an attacker to mimic an authorized AP and capture transmissions, so a users device will unknowingly connect to this evil twin instead of the authorized APĪ framework for transporting authentication protocols that defines the format of the messagesĪ 24-bit value used in WEP that changes each time a packet is encryptedĪ proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client softwareĪ methood for controlling access to a WLAN based on the device's MAC addressĪ set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity
