Book Image

Kali Linux Wireless Penetration Testing Cookbook

By : Sean-Philip Oriyano
Book Image

Kali Linux Wireless Penetration Testing Cookbook

By: Sean-Philip Oriyano

Overview of this book

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Table of Contents (8 chapters)

Bluesmacking

The first type of attack we will cover is known as Bluesmacking, and is one of the older types of attacks against this protocol. You will find in our explorations of this attack that it is a variation of a common attack against networks, devices and applications known as a Denial-of-service.

In a nutshell, when we carry out a Bluesmacking attack, we are carrying out an attack through which a specially crafted packet can make a device unusable. This attack works by transmitting a data packet that exceeds the maximum packet size available on Bluetooth devices. The end result is that the device cannot process the packet and the target becomes the victim of a Denial-of-service. This attack is a variation of the well-known attack known as the ping of death.

So what is the ping of death? A ping of death is a classic DoS attack that is generated by a malicious party transmitting...