Professional Documents
Culture Documents
Present By :-
Digvijay Maurya
Content
Introduction .
List of Wireless Security Protocols.
WEP(Wired Equivalent Privacy).
WPA(Wi-Fi Protected Access).
WPA Vulneribilities.
WPA2 and its limitation.
What is Man in the middle attack ?
What is KRACK ?
Tools.
Advantages of WPA3.
Summary.
Introduction
Password protection.
Protection against KRACK and Man in
the middle attack.
It will simplify to connect with wifi.
Stronger encryption.
Protect public Wi-Fi.
Summary