Wireless Red Teams: Evil Twins, Eavesdropping, and Password Cracking

Many companies operate wireless networks to allow greater flexibility through mobile computing. In many cases IT departments deploy wireless networks but ignore the dangers of wireless connectivity, assuming that limiting access makes them safe from wireless attacks. The problem is that wireless networks are much easier to attack and potentially compromise than their wired counterparts […]