Chapter 15. Wireless Attacks
In this chapter weâll take a brief look at wireless security. So far weâve looked at several ways to breach the security perimeter. But web application security, firewalls, security-awareness training, and so on can do nothing to protect an internal network if thereâs an attacker sitting on a bench in front of the target organizationâs building and the organization provides wireless access with weak encryption to the internal network.
Setting Up
For the examples in this chapter, Iâll be using a Linksys WRT54G2 wireless router, but any router that supports WEP and WPA2 encryption will work. By default, my Linksys router has a web administration interface at http://192.168.20.1, as shown in Figure 15-1. The ...
Get Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.