Book Image

Kali Linux Wireless Penetration Testing Cookbook

By : Sean-Philip Oriyano
Book Image

Kali Linux Wireless Penetration Testing Cookbook

By: Sean-Philip Oriyano

Overview of this book

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Table of Contents (8 chapters)

WEP attacks

The first attack we are going take a look at or re-examine in this particular chapter is the attack against the wired equivalent privacy, or WEP, protocol. We've encountered this protocol a few times in our journey through this book, and we're to take another look at it here, with some additional items added that weren't there before, and endeavor to expand on this attack so as to discuss the real weaknesses in this protocol that make it so vulnerable to attacks.

Remember that the WEP protocol is something that was implemented and designed when wireless security was something that was understood to be an issue, but the people at designed wireless technologies did not really understand how to properly implement security, nor did they consult with outside parties that could have helped them do it better. In all practical senses, WEP should no longer be...