Summary
We are now done with Day 7, so let us recap. Making sure the infrastructure if protected is important to any customer/company, so as penetration testers, it is our job to find issues that may exist. I started off the chapter with various utilities to perform wired-based network attacks. This included snmp-based issues as well as DHCP then swithing from there to DOS-based attacks. I then pivoted to wireless attacks. These are very important, as wireless attacks tend to be easier to perform, since they don't require a physical connection into the network like some of the wired-based attacks do. On the wireless side, I showed various utilities to monitor the airways as well as how to attack wireless weaknesses such as WPA, WEP, and of ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access