Hacking Wireless
Hacking Wireless
Yes, the AP is in
the Range
3
Send
Authentication
Request
4
Approve or Deny
the Authentication
Request
Since the
Authentication is
approved, then
The client send
Association
Request to Join
the AP
6
The AP approve
the Association
request and the
client is now
connected to the
AP
The AP sends a
challenge text to
the station
The station
encrypts the
challenge text
using its
configured 64-bit
or 128-bit key and
sends the
encrypted text to
the AP.
The AP compares
the decrypted text
with the original
challenge text. If
they match, the
AP authenticates
the station.
6
The station
connects to the
network
Thursday, April 11, 2024 3
Thursday, April 11, 2024 4
Thursday, April 11, 2024 5
Thursday, April 11, 2024 6
Thursday, April 11, 2024 7
Thursday, April 11, 2024 8
Client Mis-Association occurs when a device connects
AUTOMATICALLY to a rouge AP.
ON THE OTHER HAND
Rouge AP occurs when a user believes that the AP is
secure, and it is safe to connect to it (i.e. Free IAU Wi-Fi)
The key
elements that
play an
important role
in this kind of
attack