Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Kali Linux Wireless Pentesting

You're reading from   Mastering Kali Linux Wireless Pentesting Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux

Arrow left icon
Product type Paperback
Published in Feb 2016
Publisher
ISBN-13 9781785285561
Length 310 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Jilumudi Raghu Ram Jilumudi Raghu Ram
Author Profile Icon Jilumudi Raghu Ram
Jilumudi Raghu Ram
Brian Sak Brian Sak
Author Profile Icon Brian Sak
Brian Sak
Arrow right icon
View More author details
Toc

Table of Contents (11) Chapters Close

Preface 1. Wireless Penetration Testing Fundamentals FREE CHAPTER 2. Wireless Network Scanning 3. Exploiting Wireless Devices 4. Wireless Cracking 5. Man-in-the-Middle Attacks 6. Man-in-the-Middle Attacks Using Evil Twin Access Points 7. Advanced Wireless Sniffing 8. Denial of Service Attacks 9. Wireless Pentesting from Non-Traditional Platforms Index

The Metasploit CTS/RTS flood attack


In a wireless medium, collisions can degrade the performance of the network. In order to avoid collisions, clients transmitting at the same time, wireless clients, and access points use CTS/RTS, clear to send, and request to send frames before transmitting data. Whenever a wireless client wants to send data, it reserves the medium by sending RTS/CTS frames. In simple terms, when a wireless client is about to send some data, it notifies other devices on the network that it's going to send data and asks others to wait for some time before attempting to transmit themselves. Other stations respect the announcement and wait until the transfer is complete. An attacker can use these unauthenticated frames and create a denial of service condition on the target network.

By continuously sending RTS/CTS frames to other devices on the wireless network, the attacker tries to reserve the medium, thus creating an idle network. In practice, this does not ultimately lead...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at AU $24.99/month. Cancel anytime