<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wireless security flaws exposed? in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wireless-security-flaws-exposed/m-p/18437#M22904</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If not using WEP you are exposed to session-hijacking.  Cisco's 802.1X and LEAP uses mutual authentication so I would think that the man-in-the-middle attack is not possible (article says MITM attack possible with one-way authentication).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Feb 2002 22:08:03 GMT</pubDate>
    <dc:creator>kgulka</dc:creator>
    <dc:date>2002-02-22T22:08:03Z</dc:date>
    <item>
      <title>Wireless security flaws exposed?</title>
      <link>https://community.cisco.com/t5/wireless/wireless-security-flaws-exposed/m-p/18436#M22903</link>
      <description>&lt;P&gt;&lt;A class="jive-link-custom" href="http://zdnet.com.com/2102-1105-839948.html" target="_blank"&gt;http://zdnet.com.com/2102-1105-839948.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I bet they were not using AIRONET with all security features enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think using LEAP with MIC, WEP Hashing, 10-Minute Dynamic WEP Session Key, MAC Filter, and Non-Broadcast SSID will stop this type of attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Audie&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 05:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-security-flaws-exposed/m-p/18436#M22903</guid>
      <dc:creator>aonibala</dc:creator>
      <dc:date>2021-07-05T05:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless security flaws exposed?</title>
      <link>https://community.cisco.com/t5/wireless/wireless-security-flaws-exposed/m-p/18437#M22904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If not using WEP you are exposed to session-hijacking.  Cisco's 802.1X and LEAP uses mutual authentication so I would think that the man-in-the-middle attack is not possible (article says MITM attack possible with one-way authentication).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2002 22:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-security-flaws-exposed/m-p/18437#M22904</guid>
      <dc:creator>kgulka</dc:creator>
      <dc:date>2002-02-22T22:08:03Z</dc:date>
    </item>
  </channel>
</rss>

