Cassola, Aldo, Robertson, William, Kirda, Engin, Noubir, Guevara, A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication, available at http://seclab.ccs.neu.edu/static/publications/ndss2013wpa.pdf
Gopinath, K.N., Multipot: A More Potent Variant of Evil Twin available at https://www.defcon.org/html/links/dc-archives/dc-15-archive.html#Gopinath
Man-in-the-middle attack, https://www.owasp.org/index.php/Man-in-the-middle_attack
Ettercap, https://ettercap.github.io/ettercap/
Ghost-phisher available at https://github.com/savio-code/ghost-phisher
The Caffe Latte attack available at http://www.slideshare.net/AirTightWIPS/toorcon-caffe-latte-attack
The Caffe Latte attack with the aircrack-ng suite available at http://www.aircrack-ng.org/doku.php?id=cafe-latte
The Hirte attack available at http://www.aircrack-ng.org/doku.php?id=hirte
Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing Essentials
Overview of this book
Table of Contents (17 chapters)
Kali Linux Wireless Penetration Testing Essentials
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Introduction to Wireless Penetration Testing
Setting Up Your Machine with Kali Linux
WLAN Reconnaissance
WPA/WPA2 Cracking
Attacking Access Points and the Infrastructure
Wireless Client Attacks
Reporting and Conclusions
References
Index
Customer Reviews