SID
MAC (Framo Control (2 bytes)
Duration (2 bytes)Address 1
(6 bytes)Address 2
(6 bytes)Sequence
Control(2 bytes)
Address 4(6 bytes))
400
48
PIN method
It allows an attacker to bypass network security configurations.
WPA2
Only a small percentage of the total traffic can be encrypted.
Controller AP
EAP-FAST
evil twin
Bluesnarfing
Captive Portal
RFID is designed for paper-based tags while NFC is not.
WNIC probe
Its usage creates a detectable pattern.
Temporal Key Integrity Protocol (TKIP)
MAC addresses are initially exchanged unencrypted.
RFID spectrum
Users can more easily roam from one WLAN to another.
It is a framework for transporting authentication protocols
Install a network sensor to detect an attack
near field communication (NFC)
It is most commonly used in an enterprise setting .