"Thus, what is of supreme importance in war is to attack the enemy's strategy"
Sun Tzu, Art of War
In this chapter, we will attack the WLAN infrastructure's core! We will focus on how we can penetrate into the authorized network by using various new attack vectors and also how we can lure authorized clients to connect to us, as an attacker.
The WLAN infrastructure is what provides wireless services to all the WLAN clients in a system. In this chapter, we will look at various attacks which can be conducted against the infrastructure: