March 2015
Intermediate to advanced
214 pages
4h 29m
English
"Thus, what is of supreme importance in war is to attack the enemy's strategy" | ||
| --Sun Tzu, Art of War | ||
In this chapter, we will attack the WLAN infrastructure's core! We will focus on how we can penetrate into the authorized network using various new attack vectors and lure authorized clients to connect to us, as an attacker.
The WLAN infrastructure is what provides wireless services to all the WLAN clients in a system. In this chapter, we will take a look at the various attacks that can be conducted against the infrastructure:
Read now
Unlock full access