Attacking WPS

Our next attack in this chapter is against the technology known as WPS or Wi-Fi Protected Setup. This technology was introduced over a decade ago as a way to simplify the configuration of clients to a wireless network. The features were actually targeted towards consumers and those who do not have IT backgrounds, or those with IT heavy backgrounds that simply wish to purchase a computer or other device and hit a couple of buttons and have connection to their wireless network. If we just consider this capability or feature, then WPS has actually done its job quite effectively. However, there are security risks, which is why we are talking about it and learning how to exploit it in this particular recipe. But before we get too ...

Get Kali Linux Wireless Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.