Chapter 11. Wireless Network Penetration Testing
In this chapter, we will cover the following recipes:
- Metasploit and wireless
- Understanding an evil twin attack
- Configuring Karmetasploit
- Wireless MITM attacks
- SMB relay attacks
In this chapter, we will cover the following recipes: