Book Image

Kali Linux Wireless Penetration Testing Cookbook

By : Sean-Philip Oriyano
Book Image

Kali Linux Wireless Penetration Testing Cookbook

By: Sean-Philip Oriyano

Overview of this book

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Table of Contents (8 chapters)

Detecting beacon frames

Previously, we discussed beacon frames and their importance to wireless networks, as well as how they can be used in a wireless network. Now, let's take a closer look at them and see what is in a beacon frame and how to analyze it so we can use that information for later attacks in this chapter.

So, what is a beacon frame? A beacon frame is something that is sent out by a wireless access point that identifies the name of the wireless network, some parameters regarding that wireless network, as well as some other information tucked in there for housekeeping and other tasks. A beacon frame is sent out by every wireless network at regular intervals and is used to announce the presence of that network to wireless clients and devices that are in range of that access point.

Let's break down some of the pieces or components in a beacon frame sent out...