In the Ms. Betsy Davis case at the beginning of the chapter, the access point on the

Question:

In the Ms. Betsy Davis case at the beginning of the chapter, the access point on the local network did not have security. This makes a man-in-the-middle attack much easier. 

a. Given what you learned in this chapter, describe how it would be possible to use a man-in-the-middle attack if the legitimate access point does not implement 802.11i.

b. How can you get the user to associate with your evil twin access point? (The answer is not in the text.)

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: