Wireless Infrastructure Auditing

Popularity:

8

Simplicity:

6

Impact:

9

Risk Rating:

8

There are various technical activities a hacker undertakes that a wireless auditor mirrors when conducting a technical audit of a wireless network. When auditing a wireless network, these activities need to be undertaken in order to determine the network's vulnerability. These activities are classified as follows:

• RF spectrum analysis

• Wireless infrastructure device identification

• Cracking encryption

• Layer 3 connectivity testing

• RF propagation boundaries

• DoS/hijacking

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook


Post a comment