O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing - Second Edition by Vijay Kumar Velu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Compromising enterprise implementations of WPA/WPA2

WPA enterprise is the technology utilized in wide-spread corporations. It does not use a single WPA-PSK, which most of the users use to connect to the wireless network. In order to maintain the governance and flexibility of the domain accounts, corporates utilize the implementation of WPA enterprise.

A typical approach to compromise an enterprise wireless would be first to enumerate the wireless devices and finally attack the connected clients in order to find out the authentication details. This consists of spoofing a target network and also providing a good signal to the client. Then, the original valid access point later leads into MiTM attack between the Access Point (AP) and the clients ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required