O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Wireless Exploitation

In this chapter, we will cover the following recipes:

  • Setting up a wireless network
  • Bypassing MAC address filtering
  • Sniffing network traffic
  • Cracking WEP encryption
  • Cracking WPA/WPA2 encryption
  • Cracking WPS
  • Denial-of-service attacks

Introduction

Wireless networks are on the rise in the current age. The need for instant network access on-the-go or the ability to be on the Internet at any point in time at any location is increasing. Employees and guests all enter the corporate network with the need to access the Internet to either give presentations or pitch their product; even employee mobile devices might need wireless access following BYOD policies. However, one should know that wireless protocols with respect to security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required