Index

1. War Driving


2. BSS and IBSS


3. WEP


4. Authentication using WEP


5. Problems with WEP


6. Snooping/Eavesdropping


7. URL format


8. Socket code to read all packets


9. Socket code to read packets


10. Socket code to read all packets


11. handle_frame


12. Security at the data link layer


13. Legacy hardware


14. Conclusion


Index

1. War Driving
2. BSS and IBSS
3. WEP
4. Authentication using WEP
5. Problems with WEP
6. Snooping/Eavesdropping
7. URL format
8. Socket code to read all packets
9. Socket code to read packets
10. Socket code to read all packets
11. handle_frame
12. Security at the data link layer
13. Legacy hardware
14. Conclusion
Index

This document was produced using groff-1.22.