Exploiting enterprise wireless networks
In this section, we will be utilizing the enterprise wireless lab that we built in Chapter 3, Setting Up for Advanced Hacking Techniques, as it contains all the configurations needed to simulate an enterprise wireless network infrastructure that utilizes the AAA framework with a RADIUS server.
The following diagram provides a visual representation of the wireless network for this exercise:
As shown in the preceding diagram, the RADIUS server will function as the access server, which handles the AAA functions, the access point functions as the authenticator, which provides access to the network and relays authentication information to the RADIUS server, as well as an associated wireless client on the network.
Before proceeding, please ensure you implement the following guidelines:
- You will need two wireless network adapters.
- Ensure the access point can communicate...