Summary
We have now examined different tasks that are required to perform a successful attack against any wireless network, the wireless adaptor configuration, and also how to configure the wireless modem and reconnaissance of ap's using tools such as aircrack-ng
and Kismet. In this chapter, we also learned about the complete aircrack-ng
suite of tools to identify hidden networks, bypass MAC authentication, compromise WPA/WPA2, and WPA enterprise. We also saw how to set up a FakeAP using Fluxion and Ghost Phisher, and perform a DoS attack against wireless networks.
The next chapter will focus on how to assess a website using a methodology specific to this type of access, conducting the reconnaissance and scanning necessary to identify vulnerabilities that may be exploitable. We'll see how attackers take advantage of these vulnerabilities with automated tools, such as exploit frameworks and online password cracking. Finally, we'll be able to conduct the most important attacks against a web...