Premium Resources

Introduction to Hacking Wireless Networks

Wireless networks come with excellent advantages- connectivity beyond walls, wireless connection, easy to access internet even in areas where laying cables is difficult, speed and sharing. But, wireless networks have a few disadvantages, the major issue being- the questionable security.

Important Terms:

Access Point: The point where the mobile device, computers connect to the wireless network.

SSID: Service Set Identifier identifies the access point, it is a human-readable text which when broadcasted leads to the identification of an access point. 

BSSID: Mac address of the Access point.

Bandwidth: Amount of information that can be transferred over the connection.

There are various standards for wireless transmission:

wireless standards


Open Authentication:

open authentication

When a client wants to connect to an open access point he/she sends a probe request, and the AP sends a probe response; the client then sends an authentication request. Upon receiving a response, the client establishes an association with the AP.

Shared Key Authentication Process:

Here, the client sends a probe request, and the access point sends the probe response; then, the client requests for an authentication request, the AP sends an authentication challenge to the client. The client needs to send the shared key as authentication challenge response. AP, then, verifies the client and authenticates him/her, who then establishes a connection with the access point.

shared key authentication

Centralised Authentication:

In the corporate environment, instead of an Access point verifying client’s authentication details, a centralised server does the job of verifying the client. RADIUS is a centralised authentication server which verifies clients who want to connect with the access point.

centralised authentication
Image Source:

Related Topics