Book Image

Kali Linux Wireless Penetration Testing Cookbook

By : Sean-Philip Oriyano
Book Image

Kali Linux Wireless Penetration Testing Cookbook

By: Sean-Philip Oriyano

Overview of this book

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Table of Contents (8 chapters)

Working with war driving

One of the earliest and most commonly used forms of attack used to target access control is a technique known as war driving. This technique, simply put, is to use a wireless enabled device along with specialized software used to detect or probe wireless networks that have come with in range of the wireless device.

What makes war driving so popular and so effective is the fact that many computer users, both personal and business, have been deploying 802.11 wireless access points for years with little regard for security. The deployment of a wireless network that allows the user to roam has taken precedence over taking measures to secure their access points and devices against potential attack.

In response to this deployment of wireless networks that are misconfigured or insecure, we have a category of attackers that engage in this practice known as war...