Difference between revisions of "Willie Stehm 3rd Quarter"
From WLCS
Line 8: | Line 8: | ||
<p>7) Research the Anatomy of a Packet<b> [ ] </b> </p> | <p>7) Research the Anatomy of a Packet<b> [ ] </b> </p> | ||
<p>8) Research Clientless WEP Attack<b> [ ]</b> </p> | <p>8) Research Clientless WEP Attack<b> [ ]</b> </p> | ||
− | <p>9) <b> [ ]</b> </p> | + | <p>9) Research WPA and WPA2 Wireless Security<b> [ ]</b> </p> |
<p>10) <b> [ ]</b> </p> | <p>10) <b> [ ]</b> </p> | ||
Line 37: | Line 37: | ||
− | ===9)=== | + | ===9) Research WPA and WPA2 Wireless Security=== |
===10)=== | ===10)=== |
Revision as of 11:24, 3 March 2009
Contents
- 1 Ten Goals for Third Quarter
- 2 Third Quarter Goal Documentation
- 2.1 1) Dual boot Laptop to a Vista Ubuntu 8.10 setup
- 2.2 2) Configure Wireless drivers in Ubuntu
- 2.3 3) Configure Packet Injection for Intel 4965agn Wifi card
- 2.4 4) Research WEP Security
- 2.5 5) Conduct a Client-present WEP Attack
- 2.6 6) Document Attack Findings
- 2.7 7) Research the Anatomy of a Packet
- 2.8 8) Research Clientless WEP Attack
- 2.9 9) Research WPA and WPA2 Wireless Security
- 2.10 10)
Ten Goals for Third Quarter
1) Dual boot Laptop to a Vista Ubuntu 8.10 setup [ ]
2) Configure Wireless drivers in Ubuntu [ ]
3) Configure Packet Injection for Intel 4965agn Wifi card [ ]
4) Research WEP Security [ ]
5) Conduct a Client-present WEP Attack [ ]
6) Document Attack Findings [ ]
7) Research the Anatomy of a Packet [ ]
8) Research Clientless WEP Attack [ ]
9) Research WPA and WPA2 Wireless Security [ ]
10) [ ]