O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Attacking the Client

Tip

"Security is just as strong as the weakest link."

Famous Quote in Information Security Domain

Most penetration testers seem to give all the attention to the WLAN infrastructure and don't give the wireless client even a fraction of that. However, it is interesting to note that a hacker can gain access to the authorized network by compromising a wireless client as well.

In this chapter, we will shift our focus from the WLAN infrastructure to the wireless client. The client can be either a connected or isolated un-associated client. We will look at various attacks, which can be used to target the client.

We will cover the following:

  • Honeypot and Mis-Association attacks
  • Caffe Latte attack
  • De-Authenticaton and Dis-Association ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required