Attacking WPS
Our next attack in this chapter is against the technology known as WPS or Wi-Fi Protected Setup. This technology was introduced over a decade ago as a way to simplify the configuration of clients to a wireless network. The features were actually targeted towards consumers and those who do not have IT backgrounds, or those with IT heavy backgrounds that simply wish to purchase a computer or other device and hit a couple of buttons and have connection to their wireless network. If we just consider this capability or feature, then WPS has actually done its job quite effectively. However, there are security risks, which is why we are talking about it and learning how to exploit it in this particular recipe. But before we get too ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access