O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of attack

As was said, there are plenty of ways to impact the availability of a wireless network. They all have the same basic goal, which is to prevent the wireless network from being attached to and used effectively, or at all.

Before we start discussing each of the attacks in depth, we should first define which attacks we are going to be covering in this chapter:

  • Executing a disassociation flood
  • Detecting beacon frames
  • Spoofing beacon frames
  • Executing a beacon flood
  • Executing a deauthentication flood
  • ARP cache poisoning
  • Performing a denial of service
  • Hiding a wireless network

These attacks represent some of the more popular ways of impacting the availability of a wireless network, and as such we are presenting them here. As always, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required