- Demonstrate WEP encryption cracking and demonstrate mechanism to secure it
- Demonstrate WPA encryption cracking and demonstrate mechanism to secure it
- Demonstrate WPA-2 encryption cracking
Notes: In order to demonstrate the approach, participants should use their own hardware with support for the above mentioned encryption technologies.
Sample Data Required: No