Attack Preparation

When planning a wireless attack, you should consider several factors. As mentioned previously, there must be a defined goal. Whether this is a random victim detected through war driving or whether it is a defined target, you need to know who and what you are attacking, for it is in this stage that you will blueprint the procedures used to attack.

In addition, you must have the resources available to perform the attack. This can consist of hardware, programs, scripts, and/or user account information. In other words, before a cook starts preparing a meal, he needs to have a recipe and the ingredients handy.

Planning the attack can take minutes or months. If the network is a high security government site, it would be to the hacker’s ...

Get Maximum Wireless Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.