Difference between revisions of "Willie Stehm 3rd Quarter"
From WLCS
Line 7: | Line 7: | ||
<p>6) Document Attack Findings<b> [ ]</b> </p> | <p>6) Document Attack Findings<b> [ ]</b> </p> | ||
<p>7) Research the Anatomy of a Packet<b> [ ] </b> </p> | <p>7) Research the Anatomy of a Packet<b> [ ] </b> </p> | ||
− | <p>8) <b> [ ]</b> </p> | + | <p>8) Research Clientless WEP Attack<b> [ ]</b> </p> |
<p>9) <b> [ ]</b> </p> | <p>9) <b> [ ]</b> </p> | ||
<p>10) <b> [ ]</b> </p> | <p>10) <b> [ ]</b> </p> | ||
Line 34: | Line 34: | ||
− | ===8)=== | + | ===8) Research Clientless WEP Attack=== |
Revision as of 11:22, 3 March 2009
Contents
- 1 Ten Goals for Third Quarter
- 2 Third Quarter Goal Documentation
- 2.1 1) Dual boot Laptop to a Vista Ubuntu 8.10 setup
- 2.2 2) Configure Wireless drivers in Ubuntu
- 2.3 3) Configure Packet Injection for Intel 4965agn Wifi card
- 2.4 4) Research WEP Security
- 2.5 5) Conduct a Client-present WEP Attack
- 2.6 6) Document Attack Findings
- 2.7 7) Research the Anatomy of a Packet
- 2.8 8) Research Clientless WEP Attack
- 2.9 9)
- 2.10 10)
Ten Goals for Third Quarter
1) Dual boot Laptop to a Vista Ubuntu 8.10 setup [ ]
2) Configure Wireless drivers in Ubuntu [ ]
3) Configure Packet Injection for Intel 4965agn Wifi card [ ]
4) Research WEP Security [ ]
5) Conduct a Client-present WEP Attack [ ]
6) Document Attack Findings [ ]
7) Research the Anatomy of a Packet [ ]
8) Research Clientless WEP Attack [ ]
9) [ ]
10) [ ]