We have now examined the different tasks that are required for performing a successful attack against a wireless network, wireless adapter configuration, how to configure a wireless modem, and reconnaissance of APs using tools such as aircrack-ng and Kismet. In this chapter, we also learned about the complete aircrack-ng suite of tools for identifying hidden networks, bypassing MAC authentication, compromising WPA/WPA2, and WPA enterprise networks. We also saw how to set up a fake AP using Fluxion and Ghost Phisher, and how to perform DoS attacks against wireless networks.
The next chapter will focus on how to assess a website using a methodology specific to this type of access, conducting the reconnaissance and scanning necessary to identify vulnerabilities that may be exploitable. We'll see how attackers take advantage of these vulnerabilities with automated tools...