Chapter 6. Attacking Access Points and the Infrastructure
In Chapter 5, WPA/WPA2 Cracking, we learned how to crack a WPA preshared key in WPA-Personal mode. There is another way to recover PSK; attacking AP to exploit a flaw in Wi-Fi Protected Setup (WPS). In this chapter, we are going to cover this attack, the attacks against WPA-Enterprise and other attacks targeting the access points and the network infrastructure, explaining the techniques and the tools in Kali Linux to conduct such attacks.
The topics that we are going to cover are:
- Attacks against Wi-Fi Protected Setup
- Attacking WPA-Enterprise
- Denial of Service attacks
- Rogue access points
- Attacking AP authentication credentials