Fundamentals
WiFi Fundamentals
Why Learn Fundamentals?
Every sophisticated attack exploits a specific weakness in how WiFi protocols work. Without understanding 802.11 frames, WPA handshakes, or DHCP negotiations, you'll miss critical details that separate a superficial understanding from true expertise.
These guides are designed for security professionals, researchers, and curious minds who want to go beyond surface-level knowledge.
Prerequisites
- Basic computer knowledge
- Familiarity with internet browsing
- Curiosity about how things work
Core Topics
How WiFi Works
Radio frequencies, 2.4GHz vs 5GHz vs 6GHz, signal propagation, and how devices communicate wirelessly.
TCP/IP Basics
The protocol stack that powers the internet. IP addresses, ports, TCP handshakes, and UDP connections.
HTTP/HTTPS Explained
How web traffic works, the difference between HTTP and HTTPS, SSL/TLS certificates, and encryption.
DNS Explained
The phonebook of the internet. How domain names resolve to IP addresses and why DNS is a critical attack target.
Packets & Encryption
How data is broken into packets, encrypted with WPA2/WPA3, and why older encryption is vulnerable.
Network Topology
How networks are structured: routers, switches, access points, and how traffic flows from device to internet.
Ready to Learn?
Start with "How WiFi Works" to build your foundation, then move into the attack techniques.
Begin LearningYou cannot defend what you do not understand. This fundamentals section exists because every advanced attack technique in our library builds on foundational knowledge of how WiFi actually works—from radio frequency behavior through the 802.11 protocol stack to application-layer protocols like HTTP and DNS. Security professionals who skip this section consistently misjudge attack severity and misconfigure defenses.
The concepts covered here are not academic—they are the precise mechanisms that attackers exploit. When you understand how a deauth frame disrupts a client-access point association, you can evaluate whether your monitoring tools actually detect these frames. When you understand how DNS resolution works, the DNS hijacking attack technique becomes obvious rather than mysterious.
Even experienced security professionals benefit from working through these pages systematically. The attack techniques reference specific protocol details; without that foundation, you are memorizing rather than understanding. This section takes approximately two hours to work through and pays dividends on every subsequent page of this library.
Ready to Learn More?
Continue exploring WiFi security concepts or request a professional security audit.