Book Image

Kali Linux Wireless Penetration Testing Cookbook

By : Sean-Philip Oriyano
Book Image

Kali Linux Wireless Penetration Testing Cookbook

By: Sean-Philip Oriyano

Overview of this book

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Table of Contents (8 chapters)

WPA and WPA2 attacks

Our next attack targets a technology known as WPA or Wi-Fi protected access. As seen in our previous recipe WEP has a lot of drawbacks and vulnerabilities that could be exploited quite simply to gain access to and expose the information on networks protected with this protocol. Due to vulnerabilities and issues with WEP a replacement was sought, and an immediate replacement came in the form of WPA. WPA was designed to be an update or upgrade to WEP that can be implemented strictly to firmware upgrades on wireless network cards as well as wireless access points that were able to support the newer standard. When this new technology was introduced it solved a lot of the problems that WEP had brought to the table and made system administrators and consumers breathe a little bit easier.

It is important to note that while most wireless cards were able to have a...