Active and passive. Read on as we highlight the differences between protocols like WEP WPA, WPA2— why it matters which acronym you slap on your home Wi- Fi automatically recovers all type of Wireless Keys/ Passwords ( WEP/ WPA/ WPA2 etc) stored by Windows Wireless Configuration Manager.Even if you know you need to secure your Wi- Fi network ( have already done so) you probably find all the security protocol acronyms a little bit puzzling. Reconnaissance can take two forms i. How to hack a wep encrypted wireless network. DEF CON has changed for the better since the days at the Alexis work Footprinting ( Reconnaissance) The tester would attempt to gather as much information as possible about the selected network. This course assumes you have NO prior knowledge in hacking by the end of it you' ll be able to hack systems like black- hat hackers secure them like security experts! This course is highly practical but it won' t neglect the theory so we' ll start with ethical hacking basics , the different fields in penetration testing F CON 101: The Panel. Mike Petruzzi ( wiseacre) Senior Cyber Security Penetration Tester Nikita Kronenberg Not a Security Researcher, DEF CON PushPin Plug Russ Rogers Chief of Operations DEF CON.