Introduction
Wireless networks on the rise in the current age. The need for instant network access on-the-go or the ability to be on the Internet at any point in time at any location is increasing. Employees and guests all enter the corporate network with the need to access the Internet to either give presentations or pitch their product; even employee mobile devices might need wireless access following BYOD policies. However, one should know that wireless protocols with respect to security do have quite a few issues. The only way to guess the correctness of a device is via the Mac ID, which can be exploited. In this chapter, we are going to explore the different vulnerabilities observed in wireless networks. Before we jump in, let us understand a few terminologies:
- Wi-Fi interface modes
- Master: Access or station
- Managed: Infrastructure (client)
- Ad-Hoc: Device device
- Mesh: (Mesh cloud/network)
- Repeater: Range extender
- Monitor: RFMON=
- Wi-Fi frames
- Management frames:
- Beacon frame: The access...
- Management frames: