Index
A
- access points (APs) / Infrastructure mode and wireless access points
- adapter
- testing, for wireless penetration testing / Testing the adapter for wireless penetration testing
- adapter chipset compatibility
- verifying / Requirements of the wireless adapter
- Advanced Encryption Standard (AES) / An introduction to WPA/WPA2
- Aircrack-ng
- links, URL / Attacks against WEP
- used, for WEP cracking / WEP cracking with Aircrack-ng
- used, for WPA cracking / WPA cracking with Aircrack-ng
- URL / WPA cracking with Aircrack-ng
- Aircrack-ng project
- Amazon Linux AMI
- URL / Attacking the WPA
- AMD/ATI cards
- AP authentication credentials
- attacking / Attacking AP authentication credentials
- ARP Request Replay attack / Attacks against WEP
- Authentication Server (AS) / Attacking WPA-Enterprise
B
- Basic Service Set (BSS) / Infrastructure mode and wireless access points
- Basic Service Set ID (BSSID) / Infrastructure mode and wireless access points
- Brute Force Calculator
- URL / Attacking the WPA
C
- Caffe Latte attack
- about / The Caffe Latte attack
- CCMP (Counter Cipher Mode Protocol / An introduction to WPA/WPA2
- Clear-to-send (CTS) / 802.11 frames, types, and subtypes
- CloudCracker
- URL / Attacking the WPA
- Common Vulnerability Scoring System (CVSS) / The technical report
- Compute Unified Device Architecture (CUDA) / WPA cracking with the GPU
- Cowpatty
- used, for WPA cracking / WPA cracking with Cowpatty, WPA cracking with the GPU
- CVE-2014-0224
D
- discovery phase, penetration testing
- active wireless network / The discovery phase
- passive wireless network / The discovery phase
- DNS rebinding attack
- DOS attacks
- about / Denial of Service attacks
- performing, with MDK3 / DoS attacks with MDK3
- Dradis tool / Documentation tools
E
- EAP Over LAN (EAPOL) / Attacking WPA-Enterprise
- Evil Twin attack
- Extended Service Set (ESS) / Infrastructure mode and wireless access points
- Extended Service Set ID (ESSID) / Infrastructure mode and wireless access points
- Extensible Authentication Protocol (EAP) / An introduction to WPA/WPA2, Attacking WPA-Enterprise
F
- 802.11 frame / 802.11 frames, types, and subtypes
- Fern WiFi Cracker
- used, for WEP cracking / WEP cracking with Fern WiFi Cracker
- Fluhrer, Mantin and Shamir (FMS) / Attacks against WEP
- Four-way handshake / An introduction to WPA/WPA2
- Frame Check Sequence (FCS) / 802.11 frames, types, and subtypes
- frames, 802.11 standard LAN
- management frames / 802.11 frames, types, and subtypes
- control frames / 802.11 frames, types, and subtypes
- data frames / 802.11 frames, types, and subtypes
G
- general purpose computing (GPGPU) / WPA cracking with the GPU
- GISKismet / Wireless scanning with Kismet
- GPU
- used, for WPA cracking / WPA cracking with the GPU
- Group Temporal Key (GTK) / An introduction to WPA/WPA2
H
- Hirte attack
- about / The Caffe Latte attack, The Hirte attack
- URL / The Hirte attack
- honeypot access points (honeypot AP)
- hydra
I
- Initialization Vector (IV) / An introduction to WEP
- injection test
- reference link / Testing the adapter for wireless penetration testing
K
- Kali Linux
- about / Introduction to the Kali Linux distribution
- installing / Installing Kali Linux
- URL, for downloading ISOs / Installing Kali Linux
- installing, on virtual machine / Installation on a virtual machine, Installation steps
- references / Chapter 1 – Introduction to Wireless Penetration Testing, Chapter 3 – WLAN Reconnaissance, Chapter 6 – Attacking Access Points and the Infrastructure, Chapter 7 – Wireless Client Attacks
- Kali Linux distribution
- troubleshooting / Troubleshooting
L
- Lightweight EAP (LEAP) / Attacking WPA-Enterprise
M
- Master Boot Record (MBR) / Installation steps
- MDK3
- used, for performing DOS attacks / DoS attacks with MDK3
- Message Integrity Code (MIC) / An introduction to WPA/WPA2
- MIC (Message Integrity Check) / Cracking WPA keys without the AP
- MITM attacks
- about / Man-in-the-middle attacks
- Ghost phisher / Ghost phisher
- MTU (Maximum Transmission Unit) / The Fragmentation and ChopChop attacks
- Multipot attack
N
- NVIDIA cards
O
- oclHashcat tool
- used, for WPA cracking / oclHashcat
- Open Computing Language (OpenCL) / WPA cracking with the GPU
P
- Pairwise Master Key (PMK) / An introduction to WPA/WPA2
- Pairwise Transient Key (PTK) / An introduction to WPA/WPA2
- penetration testing
- phases / Phases of penetration testing
- phases, penetration testing
- about / Phases of penetration testing
- planning phase / The planning phase
- discovery phase / The discovery phase
- attack phase / The attack phase
- phases, penetration testing
- reporting phase / Phases of penetration testing
- Pixiewps / Attacks against Wi-Fi Protected Setup
- PMKs (Pairwise Master Keys) / Pyrit
- Preferred Network List (PNL) / The Caffe Latte attack
- preshared key (PSK) / An introduction to WPA/WPA2
- preshared secret key (PSK) / An introduction to WEP
- Public Key Infrastructure (PKI) / Attacking WPA-Enterprise
- Push-Button-Connect (PBC) method / Attacks against Wi-Fi Protected Setup
- Pyrit tool
- used, for WPA cracking / Pyrit
- Pyshkin, Tews, and Weinmann (PTW) / Attacks against WEP
R
- RC4 (Rivest Cipher 4) / An introduction to WEP
- Reaver / Reaver
- rebind / Attacking AP authentication credentials
- report format
- about / The report format
- executive summary / The executive summary
- technical report / The technical report
- reporting
- about / The reporting phase
- executive summary / The executive summary
- technical report / The technical report
- report writing
- stages / The four stages of report writing
- about / The four stages of report writing
- report writing, stages
- about / The four stages of report writing
- report planning / Report planning
- information collection / Information collection
- documentation tools / Documentation tools
- first draft, writing / Writing the first draft
- review and finalization / Review and finalization
- Request-to-send (RTS) / 802.11 frames, types, and subtypes
- rogue access points
- about / Rogue access points
S
- 802.11 standard LAN
- about / Introduction to 802.11 standard and wireless LAN
- frames / 802.11 frames, types, and subtypes
- infrastructure mode / Infrastructure mode and wireless access points
- wireless access points / Infrastructure mode and wireless access points
- wireless security / Wireless security
- Service Set ID (SSID) / Infrastructure mode and wireless access points
T
- Temporal Key Integrity Protocol (TKIP) / An introduction to WPA/WPA2
- Transport Layer Security (TLS) / Attacking WPA-Enterprise
V
- VirtualBox
- URL, for downloading images / Installing Kali Linux
- VirtualBox Extension Pack
- URL, for downloading / Wireless card configuration
- URL / Wireless card configuration
- virtual machine
- Kali Linux, installing on / Installation on a virtual machine, Installation steps
- creating / Creating a new virtual machine
- VMware
- URL, for downloading images / Installing Kali Linux
- vulnerable AP models
W
- 802.11 wireless LAN
- about / Introduction to 802.11 standard and wireless LAN
- infrastructure mode / Infrastructure mode and wireless access points
- wireless access points / Infrastructure mode and wireless access points
- wireless security / Wireless security
- Wash tool / Reaver
- WEP
- about / An introduction to WEP
- attacking against / Attacks against WEP
- cracking, with Aircrack-ng / WEP cracking with Aircrack-ng
- cracking, with connected clients / Cracking the WEP key with connected clients
- cracking, without connected clients / Cracking the WEP key without connected clients
- cracking, with automated tools / WEP cracking with automated tools
- cracking, with Fern WiFi Cracker / WEP cracking with Fern WiFi Cracker
- WEP key, cracking without connected clients
- about / Cracking the WEP key without connected clients
- Fragmentation attack / The Fragmentation and ChopChop attacks
- ChopChop attacks / The Fragmentation and ChopChop attacks
- ARP request frames, forging / Forging and injecting ARP request frames
- ARP request frames, injecting / Forging and injecting ARP request frames
- Wi-Fi channels
- Wi-Fi Protected Access (WPA/WPA2) / Wireless security
- Wi-Fi Protected Setup (WPS)
- about / Attacks against Wi-Fi Protected Setup
- attacking against / Attacks against Wi-Fi Protected Setup
- URL / Attacks against Wi-Fi Protected Setup
- Reaver / Reaver
- Wifite
- URLs / WEP cracking with automated tools
- used, for WPA cracking / Wifite
- Wired Equivalent Privacy (WEP) / Wireless security
- wireless adapter
- setup / Wireless adapter setup and configuration
- configuration / Wireless adapter setup and configuration
- requisites / Requirements of the wireless adapter
- wireless card
- configuring / Wireless card configuration
- wireless LAN scanning
- about / Wireless LAN scanning
- active / Wireless LAN scanning
- passive / Wireless LAN scanning
- wireless adapter, configuring in monitor mode / Configuring the wireless adapter in monitor mode
- airodump-ng, using / Wireless scanning with airodump-ng, Wireless scanning with Kismet
- wireless penetration testing
- adapter, testing for / Testing the adapter for wireless penetration testing
- WPA
- attacking / Attacking the WPA
- cracking, with Aircrack-ng / WPA cracking with Aircrack-ng
- cracking, with Cowpatty / WPA cracking with Cowpatty
- cracking, with GPU / WPA cracking with the GPU
- WPA, cracking with automated tools
- about / WPA cracking with automated tools
- Wifite, using / Wifite
- WPA, cracking with GPU
- about / WPA cracking with the GPU
- Pyrit, using / Pyrit
- oclHashcat tool, using / oclHashcat
- WPA-Enterprise
- attacking / Attacking WPA-Enterprise
- network, setting up / Setting up a WPA-Enterprise network
- attack against EAP, performing / Attacks targeting EAP
- PEAP, attacking / Attacking PEAP
- WPA/WPA2
- about / An introduction to WPA/WPA2
- authentication process / An introduction to WPA/WPA2
- WPA, attacking / Attacking the WPA
- WPA, cracking with Aircrack-ng / WPA cracking with Aircrack-ng
- WPA, cracking with Cowpatty / WPA cracking with Cowpatty
- WPA keys
- cracking, without API / Cracking WPA keys without the AP