Compromising enterprise implementations of WPA/WPA2

WPA enterprise is the technology used in many corporations. It does not use a single WPA-PSK, which most of the users use to connect to the wireless network. In order to maintain the governance and flexibility of the domain accounts, corporations use WPA enterprise.

A typical approach to compromising an enterprise wireless network would be first enumerating the wireless devices and finally attacking the connected clients in order to find out the authentication details. This consists of spoofing a target network and also providing a good signal to the client. Then, the original valid access point later leads into a MitM attack between the Access Point (AP) and the clients connecting to the ...

Get Mastering Kali Linux for Advanced Penetration Testing - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.