Chapter 6. Wireless Attacks
"What consumes in the enigma, controls the technology"
With the dominance of mobile devices, adoption of Bring Your Own Devices (BYOD) in companies and the need to provide instant network connectivity, wireless networks have become the ubiquitous access point to the internet. Unfortunately, the convenience of wireless access is accompanied with an increase in effective attacks that result in theft of data and unauthorized access as well as the denial of service of network resources. Kali provides several tools to configure and launch these wireless attacks, allowing organizations to improve security.
In this chapter, we will examine several housekeeping tasks and wireless attacks, including:
- Configuring Kali for wireless attacks
- Wireless reconnaissance
- Bypassing Hidden Service Set Identifier (SSID)
- Bypassing the MAC address authentication and open authentication
- Compromising WPA/WPA2 encryption and performing Man-in-The-Middle attacks (MiTM).
- Attacking wireless routers...