With the dominance of mobile devices, the adoption of Bring Your Own Device (BYOD) initiatives in companies, and the need to provide instant network connectivity, wireless networks have become the ubiquitous access point to the internet. Unfortunately, the convenience of wireless access is accompanied with an increase in effective attacks that result in theft of data and unauthorized access, as well as the denial of network resource services. Kali provides several tools for configuring and launching these wireless attacks.
In this chapter, we will examine several housekeeping tasks and wireless attacks, which will entail covering the following:
- Configuring Kali for wireless attacks
- Wireless reconnaissance
- Bypassing hidden Service Set Identifiers (SSIDs)
- Bypassing MAC address authentication and open authentication
- Compromising WPA/WPA2 encryption and performing...