įįာįဲįį်းį”ောį်( Ray Electronic )
įေးįားįားįော wireless įိုးįောį်į
į်းįį်įျį်įျား
įįုį
ာį”ုį်įါį”įျį်į”įį်įျားį”įį်းįį်įော်įြįျį်įျား
(1)Wireless Lab Setup
(2)WLAN and Inherent Insecurities
(3)Bypassing WLAN Authentication
(4)WLAN Encryption Flaws
(5)Attacks on the WlAN Infrastructure
(6)Attacking the Client
(7)Advanced WLAN Attacks
(8)Attacking WPA-Enterprise and RADIUS
(9)WlAN Penetration Testing Methodology
