We will assume that the wireless client has a network Wireless Lab configured on it, and it actively sends Probe Requests for this network, when it is not connected to any access point. In order to find the security configuration of this network, we will need to create multiple access points. For our discussion, we will assume that the client profile is an open network, WEP protected, WPA-PSK, or WPA2-PSK. This means we will have to create four access points. To do this, we will first create four virtual interfaces—
mon0
tomon3
, using theairmon-ng start wlan0
command multiple times:You can view all these newly created interfaces using the
ifconfig –a
command:We can run
airodump-ng
on the same channel to ensure that all four access points are up and running, as shown in the following screenshot...
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By :
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By:
Overview of this book
Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Free Chapter
Wireless Lab Setup
WLAN and its Inherent Insecurities
Bypassing WLAN Authentication
WLAN Encryption Flaws
Attacks on the WLAN Infrastructure
Attacking the Client
Advanced WLAN Attacks
Attacking WPA-Enterprise and RADIUS
WLAN Penetration Testing Methodology
WPS and Probes
Pop Quiz Answers
Index
Customer Reviews