Chapter 16. Actual Attack Tools
Therefore, against those skilled in attack, an enemy does not know where to defend; against the experts in defense, the enemy does not know where to attack. Therefore I say: 'Know the enemy but know yourself; in a hundred battles you will never be in peril.' | ||
--Sun Tzu, The Art of War |
This chapter looks in detail at several tools, available on the Internet, that hackers can use to attack Wi-Fi networks. Most are UNIX based and require the ability to compile (and sometimes tweak) the tool. However, more are becoming available for Microsoft Windows all the time. We explain where to get the tools, what they do, and how to use them. Some people might feel uncomfortable about our publicizing these tools and explaining ...
Get Real 802.11 Security: Wi-Fi Protected Access and 802.11i now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.