O'Reilly logo

Mastering Kali Linux Wireless Pentesting by Brian Sak, Jilumudi Raghu Ram

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Metasploit's fake beacon flood attack

In this example, we will carry out an attack similar to what was demonstrated with MDK3 with Metasploit and its fakeap module. This attack will require a little prework as you will need to add packet injection capabilities to the Metasploit framework. You can add this functionality using lorcon2, a set of libraries and interfaces specifically for packet injection onto wireless networks.

Configuring packet injection support for Metasploit using lorcon

Before you begin to use Metasploit to inject packets onto the target network, you will need to install the lorcon package and libraries to enable packet injection via Python and Ruby. This provides a consistent way for the Metasploit package to send the crafted ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required