Summary

In this chapter, we have covered the attacks against the access points and the network, in particular those against WPS and WPA-Enterprise, how to set up a rogue AP, DoS attacks, and AP authentication attacks.

In Chapter 7, Wireless Client Attacks, we will see attacks targeting the wireless clients, such as Honeypot and Evil Twin APs, the Caffe Latte and Hirte attacks, the man-in-the-middle attacks, and client deauthentication.

Get Kali Linux Wireless Penetration Testing Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.