IT security
2 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by CyberSecurityLabs
Scoop.it!

Introduction to Port Scanners

Introduction to Port Scanners | IT security | Scoop.it
Port scanners are often used by administrators to check the security policies or by attackers to identify running services on a host. Port scanning is used to send packets to a list of port numbers...
more...
No comment yet.
Scooped by CyberSecurityLabs
Scoop.it!

Uncovering Hidden SSIDs using Wireshark

Uncovering Hidden SSIDs using Wireshark | IT security | Scoop.it
Hidden SSID is an option for every access-point in order to not broadcast the SSID. In case that an access-point is not broadcasting the SSID, only clients that already know the preconfigured SSID ...
more...
No comment yet.
Scooped by CyberSecurityLabs
Scoop.it!

Deauthentication/Disassociation attack

Deauthentication/Disassociation attack | IT security | Scoop.it
Deauthentication/Disassociation attack is a part of the Denial-of-Service attacks. Attackers may also use this attack in order to recover hidden ESSIDs or to capture WPA/WPA2 handshakes by forcing ...
more...
No comment yet.