Chapter 6. Attacking Access Points and the Infrastructure
In Chapter 5, WPA/WPA2 Cracking, we learned how to crack a WPA preshared key in WPA-Personal mode. There is another way to recover PSK; attacking AP to exploit a flaw in Wi-Fi Protected Setup (WPS). In this chapter, we are going to cover this attack, the attacks against WPA-Enterprise and other attacks targeting the access points and the network infrastructure, explaining the techniques and the tools in Kali Linux to conduct such attacks.
The topics that we are going to cover are:
- Attacks against Wi-Fi Protected Setup
- Attacking WPA-Enterprise
- Denial of Service attacks
- Rogue access points
- Attacking AP authentication credentials
Attacks against Wi-Fi Protected Setup
WPS is a security mechanism for ...
Get Kali Linux Wireless Penetration Testing Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.