Introduction
When working with wireless networks, one of the categories of attacks that may be used is that of access control attacks. Attacks put into this category aim to penetrate and compromise a wireless network by evading access control measures. These types of access control measures include items such as MAC filtering, misconfiguration, rogue access points, and other items we will discuss within this chapter.
Before we go too far, let's take a more detailed look at access control in order to understand more clearly what it is that we are attacking in this particular chapter.
The access control process is one that involves identification of syndication and authorization. Any attack against access control is going seek to steal credentials, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access