Chapter 15. Wireless Attacks

In this chapter we’ll take a brief look at wireless security. So far we’ve looked at several ways to breach the security perimeter. But web application security, firewalls, security-awareness training, and so on can do nothing to protect an internal network if there’s an attacker sitting on a bench in front of the target organization’s building and the organization provides wireless access with weak encryption to the internal network.

Setting Up

For the examples in this chapter, I’ll be using a Linksys WRT54G2 wireless router, but any router that supports WEP and WPA2 encryption will work. By default, my Linksys router has a web administration interface at, as shown in Figure 15-1. The ...

Get Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.