From the course: Ethical Hacking: Wireless Networks
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Understanding the Wi-Fi Protected Setup (WPS) - Linux Tutorial
From the course: Ethical Hacking: Wireless Networks
Understanding the Wi-Fi Protected Setup (WPS)
- [Narrator] The WiFi Alliance has defined a guideline for the WiFi Simple Configuration or WSC protocol. And manufactories can submit their devices to be certified to use the term WiFi Protected Setup, WPS. So to be correct, WPS is the feature and WSC is the protocol. Many modern wireless routers include the WPS feature to provide user-friendly method of connecting to a home network at the press of a button. To connect a device to a secure home network requires knowledge of its SSID. And without WPS, also requires knowledge of its WPA password. To connect, you select wireless networks in the device setup and then pick the network to connect to by SSID. There'll likely be many networks visible. And then enter its security key. WPS simplifies the connection process. Connecting using a WPS certified device involves selecting the network. When asked for the network key, the user presses the WPS button on the router.…
Contents
-
-
-
Understanding wireless networks5m 52s
-
(Locked)
Selecting an antenna for wireless network testing5m 16s
-
(Locked)
Configuring security in wireless networks3m 26s
-
(Locked)
Understanding the Wi-Fi Protected Setup (WPS)5m 20s
-
(Locked)
Extracting WEP passwords using Wifite2m 9s
-
(Locked)
Extracting network passwords through WPS2m 35s
-
(Locked)
Using WiFite and Aircrack-ng to test WPA passwords2m
-
(Locked)
Using Pixiedust to recover keys2m 44s
-
(Locked)
A first look at WPA32m 26s
-
(Locked)
Understanding Dragonblood2m 37s
-
-
-
-
-
-