Chapter 6 – Attacking Access Points and the Infrastructure
- The Wi-Fi Protected Setup documentation available at http://www.wi-fi.org/discover-wi-fi/wi-fi-protected-setup
- The Pixie-Dust attack against Wi-Fi Protected Setup available at http://archive.hack.lu/2014/Hacklu2014_offline_bruteforce_attack_on_wps.pdf
- Reaver available at https://code.google.com/p/reaver-wps/
- Recommendation for EAP Methods Used in Wireless Network Access Authentication, NIST SP, 800-120, available at http://csrc.nist.gov/publications/nistpubs/800-120/sp800-120.pdf
- The MDK3 tool available at http://aspj.aircrack-ng.org/#mdk3
- The Airbase-ng documentation available at http://www.aircrack-ng.org/doku.php?id=airbase-ng
- Hydra available at https://www.thc.org/thc-hydra/
- Protecting Browsers ...
Get Kali Linux Wireless Penetration Testing Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.