O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of attack

Confidentiality attacks against a wireless network are incredibly effective and powerful in the hands of a skilled and knowledgeable attacker or intruder. It's not uncommon for the mechanisms and devices that are used to protect a wireless network to be misconfigured, or to have the owners of these networks be unaware of the types of attacks available. A system owner that is unaware of misconfiguration issues, flaws, or defects in their wireless network or protection mechanisms themselves leave them wide open to a myriad of attacks that can be used against them, and in some cases to devastating effect. Just remember that wireless networks can be secured, but like anything you have to take the time and effort to ensure that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required