Appendix

image
Figure 1.1 This attack tree diagram shows basic attacker options for compromising a public WiFi hotspot. The diagram assumes an opportunistic attacker who is not targeting a specific victim, although these methods could be combined with others if a specific victim or victim type is being targeted.
image
Figure 1.2 This attack tree diagram shows basic attacker options for setting up a spearphishing attack. The diagram assumes a focused attacker who is targeting a specific victim or specific type of victim. For example, victims with a common ...

Get Hacking Wireless Access Points now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.