Chapter 6. Attacking Access Points and the Infrastructure

In Chapter 5, WPA/WPA2 Cracking, we learned how to crack a WPA preshared key in WPA-Personal mode. There is another way to recover PSK; attacking AP to exploit a flaw in Wi-Fi Protected Setup (WPS). In this chapter, we are going to cover this attack, the attacks against WPA-Enterprise and other attacks targeting the access points and the network infrastructure, explaining the techniques and the tools in Kali Linux to conduct such attacks.

The topics that we are going to cover are:

  • Attacks against Wi-Fi Protected Setup
  • Attacking WPA-Enterprise
  • Denial of Service attacks
  • Rogue access points
  • Attacking AP authentication credentials

Attacks against Wi-Fi Protected Setup

WPS is a security mechanism for ...

Get Kali Linux Wireless Penetration Testing Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.