|
(Cracking of wireless networks ) is the defeating of security devices in Wireless local-area networks. Wireless local-area networks(WLANs) – also called Wi-Fi networks are inherently vulnerable to security lapses that wired networks are exempt from.〔''Hacking Wireless Networks For Dummies'' by Kevin Beaver and Peter T. Davis, Wiley Publishing, Inc., 2005, pages 9-10.〕 Cracking is a kind of information network attack that is akin to a direct intrusion. There are two basic types of vulnerabilities associated with WLANs: those caused by poor configuration and those caused by weak encryption. Not only this these days cracking a wifi can also be possible with (android devices ).〔''How To Hack WIFI Password Using Android Phone'' by Piyush Golani〕 ==Wireless network basics== *Wireless local-area networks are based on IEEE 802.11. This is a set of standards defined by the Institute of Electrical and Electronics Engineers.〔''Hacking Wireless Networks For Dummies'' by Kevin Beaver and Peter T. Davis, Wiley Publishing, Inc., 2005, page 9.〕 *802.11 networks are either ''infrastructure'' networks or ''ad hoc'' networks. By default, people refer to infrastructure networks. Infrastructure networks are composed of one or more ''access points'' that coordinate the wireless traffic between the nodes and often connect the nodes to a wired network, acting as a bridge or a router. * *Each access point constitutes a network that is named a ''basic service set'' or BSS. A BSS is identified by a BSSID, usually the MAC address of the access point. * *Each access point is part of an ''extended service set'' or ESS, which is identified by an ESSID or SSID in short, usually a character string. * *A basic service set consists of one access point and several wireless ''clients''. An extended service set is a configuration with multiple access points and roaming capabilities for the clients. An independent basic service set or IBSS is the ad hoc configuration. This configuration allows wireless clients to connect to each other directly, without an access point as a central manager.〔''Hacking Wireless Networks For Dummies'' by Kevin Beaver and Peter T. Davis, Wiley Publishing, Inc., 2005, pages 179-181.〕 * *Access points broadcast a signal regularly to make the network known to clients. They relay traffic from one wireless client to another. Access points may determine which clients may connect, and when clients do, they are said to be ''associated'' with the access point. To obtain access to an access point, both the BSSID and the SSID are required.〔''Security Power Tools'' by Bryan Burns and others, O'Reilly Media, Inc., 2007, pages 102-103.〕 *Ad hoc networks have no access point for central coordination. Each node connects in a peer-to-peer way. This configuration is an ''independent basic service set'' or IBSS. Ad hoc networks also have an SSID.〔 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Cracking of wireless networks」の詳細全文を読む スポンサード リンク
|