Book Image

Kali Linux Wireless Penetration Testing Essentials

Book Image

Kali Linux Wireless Penetration Testing Essentials

Overview of this book

Table of Contents (17 chapters)
Kali Linux Wireless Penetration Testing Essentials
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
1
Introduction to Wireless Penetration Testing
Index

Chapter 6. Attacking Access Points and the Infrastructure

In Chapter 5, WPA/WPA2 Cracking, we learned how to crack a WPA preshared key in WPA-Personal mode. There is another way to recover PSK; attacking AP to exploit a flaw in Wi-Fi Protected Setup (WPS). In this chapter, we are going to cover this attack, the attacks against WPA-Enterprise and other attacks targeting the access points and the network infrastructure, explaining the techniques and the tools in Kali Linux to conduct such attacks.

The topics that we are going to cover are:

  • Attacks against Wi-Fi Protected Setup

  • Attacking WPA-Enterprise

  • Denial of Service attacks

  • Rogue access points

  • Attacking AP authentication credentials