Book Image

Kali Linux Wireless Penetration Testing Essentials

Book Image

Kali Linux Wireless Penetration Testing Essentials

Overview of this book

Table of Contents (17 chapters)
Kali Linux Wireless Penetration Testing Essentials
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
1
Introduction to Wireless Penetration Testing
Index

Summary


In this chapter, we have covered the WPA/WPA2 security protocol and analyzed how to capture the WPA four-way handshake and use it to crack the PSK with the many tools available on Kali Linux.

There is also an attack against Wi-Fi Protected Setup (WPS) deployments that can lead to WPA PSK recovery in a relatively short time. We will cover this and other attacks against access points in Chapter 6, Attacking Access Points and the Infrastructure.