O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Wireless Network Analysis

In this chapter, we will cover:

  • Cracking a WEP wireless network
  • Cracking a WPA/WPA2 wireless network
  • Automating a wireless network cracking
  • Accessing clients using a fake AP
  • URL traffic manipulation
  • Port redirection
  • Sniffing network traffic
  • Accessing an e-mail by stealing cookies

Introduction

These days, wireless networks are everywhere, with users being on the go like never before. Having to remain stationary due to a reliance on an Ethernet cable to gain Internet access is quite inconvenient to most users. For this convenience, there is a price that is paid; wireless connections are not as secure as Ethernet connections. In this chapter, we will explore various methods for manipulating radio network traffic including ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required