-
Book Overview & Buying
-
Table Of Contents
Kali Linux: Wireless Penetration Testing Beginner's Guide - Second Edition
By :
"To know your enemy, you must become your enemy." | ||
| --Sun Tzu, Art of War | ||
As a penetration tester, it is important to know the advanced attacks a hacker can do, even if you might not check or demonstrate them during a penetration test. This chapter is dedicated to showing how a hacker can conduct advanced attacks using wireless access as the starting point.
In this chapter, we will take a look at how we can conduct advanced attacks using what we have learned so far. We will primarily focus on the man-in-the-middle attack (MITM), which requires a certain amount of skill and practice to conduct successfully. Once we have done this, we will use this MITM attack as a base from which to conduct more sophisticated attacks such as Eavesdropping and session hijacking.
In this chapter, we will cover the following topics: