<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Enterprise &#8211; \x44\x61\x6e\x6b</title>
	<atom:link href="/tag/enterprise/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Dank adventures in security</description>
	<lastBuildDate>Mon, 27 Mar 2023 05:25:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>
	<item>
		<title>Cheatsheet &#8211; Wireless Security</title>
		<link>/2020/12/03/wireless-security-cheat-sheet/</link>
					<comments>/2020/12/03/wireless-security-cheat-sheet/#respond</comments>
		
		<dc:creator><![CDATA[Dank]]></dc:creator>
		<pubDate>Thu, 03 Dec 2020 23:16:25 +0000</pubDate>
				<category><![CDATA[Cheat Sheet]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<category><![CDATA[cheat sheet]]></category>
		<category><![CDATA[EAP]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[wireless security]]></category>
		<guid isPermaLink="false">/blog/?p=25</guid>

					<description><![CDATA[A living cheat sheet of wireless information]]></description>
										<content:encoded><![CDATA[
<p><strong>Personal Networks</strong>:</p>



<ul>
<li>Typical WEP &amp; WPA is bad, WPA2 is good</li>
</ul>



<p><strong>Enterprise Networks</strong>:</p>



<p>Overview of Enterprise security, WPA modes, Enterprise network architecture and deployment guide:</p>



<ul>
<li><a href="/a-crash-course-into-wpa-enterprise-security-and-deployment" target="_blank" rel="noreferrer noopener">/a-crash-course-into-wpa-enterprise-security-and-deployment</a></li>
</ul>



<p>Whitepaper on attacking and defending Enterprise networks:</p>



<ul>
<li>Whitepaper overview: <a href="/attacking-and-defending-wpa-enterprise-networks" target="_blank" rel="noreferrer noopener">/</a><a rel="noreferrer noopener" href="/index.php/archive/attacking-and-defending-wpa-enterprise-networks" target="_blank">/attacking-and-defending-wpa-enterprise-networks</a></li>
</ul>



<ul>
<li>Whitepaper full pdf: <a href="/attacking-and-defending-wpa-enterprise-networks/attacking-and-defending-wpa-enterprise-networks.pdf">/attacking-and-defending-wpa-enterprise-networks/attacking-and-defending-wpa-enterprise-networks.pdf</a></li>
</ul>



<p>EAP Method Compatability Tables (Taken from blog post)</p>



<ul>
<li><strong>Tunnelled EAP Methods</strong></li>
</ul>



<figure class="wp-block-image size-large"><img decoding="async" width="525" height="422" src="/wp-content/uploads/2022/07/Tunnelled-EAP-Methods.png" alt="" class="wp-image-92" srcset="/wp-content/uploads/2022/07/Tunnelled-EAP-Methods.png 525w, /wp-content/uploads/2022/07/Tunnelled-EAP-Methods-300x241.png 300w" sizes="(max-width: 525px) 100vw, 525px" /></figure>



<ul>
<li><strong>Native EAP Methods</strong></li>
</ul>



<figure class="wp-block-image size-large"><img decoding="async" width="522" height="268" src="/wp-content/uploads/2022/07/Native-EAP-Methods.png" alt="" class="wp-image-93" srcset="/wp-content/uploads/2022/07/Native-EAP-Methods.png 522w, /wp-content/uploads/2022/07/Native-EAP-Methods-300x154.png 300w" sizes="(max-width: 522px) 100vw, 522px" /></figure>
]]></content:encoded>
					
					<wfw:commentRss>/2020/12/03/wireless-security-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
