-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Kali Linux Cookbook - Third Edition
By :
In this chapter, we will explore the techniques and tools used to assess and attack wireless networks. Wireless environments introduce unique vulnerabilities, such as misconfigured access points to easy-to-spoof environments. This chapter guides you through building a controlled lab for Wi-Fi testing and walks you through tactics used against wireless networks.
You will begin by setting up a wireless testing environment with a supported adapter and a target access point. From there, you will learn how to scan for visible and hidden SSIDs, analyze collected wireless traffic, and launch denial-of-service (DoS) attacks against client devices. You’ll capture WPA2 handshakes and crack them using wordlist attacks, bypass MAC-based authentication by spoofing authorized clients, and execute rogue access point attacks to harvest sensitive credentials through deceptive captive portals.
These recipes highlight how wireless attacks combine attacks...