Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Summary


In this chapter, we learned that even the wireless client is susceptible to attacks. These include the Honeypot and other Mis-Association attacks; Caffe Latte attack to retrieve the key from the wireless client; deauthentication and disassociation attacks causing a Denial of service, Hirte attack as an alternative to retrieve the WEP key from a roaming client; and, finally, cracking the WPA-Personal passphrase with just the client.

In the next chapter, we will use what we've learned so far to conduct various advanced wireless attacks on both the client and infrastructure side. So, quickly flip the page to the next chapter!