O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. WLAN and Its Inherent Insecurities

Tip

"The loftier the building, the deeper the foundation must be laid."

Thomas Kempis, Writer

Nothing great can be built on a weak foundation, and in our context, nothing secure can be built on something which is inherently insecure.

WLANs by design have certain insecurities which are relatively easy to exploit, such as packet spoofing, packet injection, and sniffing (which could even happen from far away). We will explore those flaws in this chapter.

In this chapter, we will look at the following:

  • Revisiting WLAN frames
  • Different frame types and sub-types
  • Using Wireshark to sniff Management, Control, and Data frames
  • Sniffing data packets for a given wireless network
  • Injecting packets into a given wireless ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required