O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacking WPS

Our next attack in this chapter is against the technology known as WPS or Wi-Fi Protected Setup. This technology was introduced over a decade ago as a way to simplify the configuration of clients to a wireless network. The features were actually targeted towards consumers and those who do not have IT backgrounds, or those with IT heavy backgrounds that simply wish to purchase a computer or other device and hit a couple of buttons and have connection to their wireless network. If we just consider this capability or feature, then WPS has actually done its job quite effectively. However, there are security risks, which is why we are talking about it and learning how to exploit it in this particular recipe. But before we get too ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required