O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of access control attacks

Access control attacks come in many forms, not all of which we can cover within the pages of this book. However, we can cover many of the more common forms of this type of attack. Before we start exploring each one of our attacks, let's first lay out the attacks that will be covered in this chapter:

  • War driving
  • Rogue access points
  • MAC spoofing
  • Ad hoc associations
  • AP misconfiguration
  • Client misassociation
  • Unauthorized association
  • Promiscuous client

Remember, these are just a few of the types of attacks that can be used to target the access controls present on a wireless network; they should never be considered the only types of access control attacks.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required