So I don't think it's possible to go to a conference these days and not see a talk on mobile or wireless. (They tend to schedule the streams to have both mobile and wireless talks at the same time—the sneaky devils. There is no escaping the wireless knowledge!) So, it makes sense that we work out some ways of training people how to skill up on these technologies. We're going to touch on some older vulnerabilities that you don't see very often, but as always, when you do, it's good to know how to insta-win.
In this chapter, we will specifically focus on the following topics:
Prerequisites for this chapter
Network setup
In-depth setup of a WEP network and dummy traffic
In-depth setup of a WPA-2 network for handshake capture
In-depth setup of vulnerable phones and devices
In-depth setup of a secondary vulnerable phone scenario
Exploit guides for all scenarios