O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

WPA and WPA2 attacks

Our next attack targets a technology known as WPA or Wi-Fi protected access. As seen in our previous recipe WEP has a lot of drawbacks and vulnerabilities that could be exploited quite simply to gain access to and expose the information on networks protected with this protocol. Due to vulnerabilities and issues with WEP a replacement was sought, and an immediate replacement came in the form of WPA. WPA was designed to be an update or upgrade to WEP that can be implemented strictly to firmware upgrades on wireless network cards as well as wireless access points that were able to support the newer standard. When this new technology was introduced it solved a lot of the problems that WEP had brought to the table and made ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required