Book Image

Kali Linux Wireless Penetration Testing Cookbook

By : Sean-Philip Oriyano
Book Image

Kali Linux Wireless Penetration Testing Cookbook

By: Sean-Philip Oriyano

Overview of this book

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Table of Contents (8 chapters)

Cracking WEP

One of the unique characteristics of wireless networks is of course the fact that they don't use traditional media and instead use radio waves to carry their information from point to point. This is what makes the networks so attractive and popular, in that a person can carry their device anywhere within range of the wireless network and still maintain that access without having to worry about cables and such. However, this strength comes at a price, and that is that radio signals are indiscriminate and anyone who is in a position to receive them will also be in a position to process the information they carry.

Fortunately for us, the designers of wireless networks saw this as an issue and decided to add protection to the initial specification of the IEEE 802.11b network design in the form of Wired Equivalent Protocol (WEP). At the time of release, WEP was viewed...