Q.2: How would you describe the process of shared key authentication in wireless networks? Q.3: Where is the password hashes are stored in Windows XP and Linux OS? Q.4: How would you compare LM, NTLM hashes? Q.5: How would you use different type of Keyloggers? Q.6: How would you categorize password attacking techniques? Q.7: Identify the different parts of WEP? Lets assume Data= 13, ICV =01 and KeyStream generated using the WEP key and IV is 100110. Explain how the data will be encrypted, sent and decrypted using WEP.