Chapter 7. Wireless Client Attacks
So far, we have covered attacks against WEP and WPA/WPA2 protocols, access points, and network infrastructure. In this chapter, we treat attacks targeting the clients, whether they are connected or not to a Wi-Fi network. We will cover the following topics in this chapter:
- Honeypot access points and Evil Twin attacks
- Man-in-the-middle attacks
- Caffe Latte and Hirte attacks
- Cracking WPA keys without the AP