In this chapter, we have examined different tasks that are required to perform a successful attack against any wireless network, wireless adapter configuration, and also how to configure the wireless modem and reconnaissance of APs using tools such as aircrack-ng
and Kismet. In this chapter, we also learned about the complete suite of aircrack-ng
tools that are used to identify hidden networks, bypass MAC authentication, compromise WPA/WPA2, and WPA enterprise. We also saw how to we can utilize the existing automated tool Wifite to perform a quick capture of handshake and crack passwords offline or with a good dictionary with the use of multiple options. Then, we took a deep dive into setting up a FakeAP
using Fluxion and Ghost Phisher, and performed a DoS attack against the wireless networks.
In the next chapter, we will focus on how to assess a website using a methodology that's specific to this type of access, thereby conducting the reconnaissance and scanning that's necessary...