O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of attack

The attacks that target authentication on wireless networks are varied, with each having its own advantages and disadvantages that make them useful or not useful in any given situation.

Before we start exploring each one of our attacks, let's first lay out the attacks that will be covered in this chapter.

  • WEP attacks
  • WPA attacks
  • WPA2 attacks
  • WPS attacks

Remember these are just a few of the types of attack that can be used to subvert the authentication of a wireless network; they should never be considered the only types of attacks.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required