O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Attacks on the WLAN Infrastructure

Tip

"Thus, what is of supreme importance in war is to attack the enemy's strategy"

Sun Tzu, Art of War

In this chapter, we will attack the WLAN infrastructure's core! We will focus on how we can penetrate into the authorized network by using various new attack vectors and also how we can lure authorized clients to connect to us, as an attacker.

The WLAN infrastructure is what provides wireless services to all the WLAN clients in a system. In this chapter, we will look at various attacks which can be conducted against the infrastructure:

  • Default accounts and credentials on the access point
  • Denial of service attacks
  • Evil twin and access point MAC spoofing
  • Rogue access points

Default accounts and credentials ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required