O'Reilly logo

Kali Linux Wireless Penetration Testing Essentials by Marco Alamanni

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Attacking Access Points and the Infrastructure

In Chapter 5, WPA/WPA2 Cracking, we learned how to crack a WPA preshared key in WPA-Personal mode. There is another way to recover PSK; attacking AP to exploit a flaw in Wi-Fi Protected Setup (WPS). In this chapter, we are going to cover this attack, the attacks against WPA-Enterprise and other attacks targeting the access points and the network infrastructure, explaining the techniques and the tools in Kali Linux to conduct such attacks.

The topics that we are going to cover are:

  • Attacks against Wi-Fi Protected Setup
  • Attacking WPA-Enterprise
  • Denial of Service attacks
  • Rogue access points
  • Attacking AP authentication credentials

Attacks against Wi-Fi Protected Setup

WPS is a security mechanism for ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required