Wi-Fi is a Passion


Preparation CWSP

Hereby my plan of action for preparing for Certified Wireless Security Professional.

This exam is very theoretic based. Need to know the different type of handshakes, roaming methods and EAP types. Knowing the protocol analysis from t... <read more>

Overview - WIDS and WIPS

As you probably know, there are multiple attacks possible in the wireless world. To detect and prevent those attacks there are monitor tools like a wireless intrusion detection system (WIDS). The best solution for attacks is to prevent them. With wir... <read more>

WIDS and WIPS analysis and monitoring

In the overview WIDS/WIPS blog, I wrote of four analysis methods from the server used to collect data:
- Signature analysis looks for patterns.
- Behaviour analysis looks for anomalies.
- Protocol analysis analyses the MAC layer... <read more>

Older blogs:

Rogue detection and mitigation
Overview - Roaming
Key Caching
Fast Secure Roaming
Fast BSS Transition
Overview - Encryption
Encryption Methods
Authentication and Key Management
WLAN Security Infrastructures VPN and Management
WLAN Security Infrastructures terms
WLAN Security Infrastructures Architectures
per-user PSK and SAE
PSK Authentication
Overview - LDAP and RADIUS
EAP Authentication
Overview - Authentication
Security Policies
Network Attacks
Legacy Security
Legacy Encryption
Legacy Authentication
Overview - Security
Security - WPA2-Enterprise
Security - WPA2-Personal
Overview - Authentication