Metasploit and wireless

Although it doesn't have modules that directly exploit wireless vulnerabilities, Metasploit is one of the best tools to use when performing wireless penetration testing. Take for example the post-exploitation wireless modules, which can be used, among other things, to extract saved wireless LAN profiles and get the passphrases.

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.