In this chapter, you have learned about the various wireless attack methods. We have identified a key component of a wireless network, wireless frames, and the various information that can be obtained from some of these frames. You have learned which network cards are capable of performing packet injection, intercepting wireless packets, and how to increase power ratings of an Alfa wireless card.
We discussed the various encryption methods that exist in wireless networks, and the vulnerabilities of them. You have gained knowledge about various attack tools, and how to perform different types of attacks. Lastly, you have learned how to crack WEP and WPA/WPA2 pre-shared keys.
In Chapter 10, Moving Laterally and Escalating Your Privileges, we will look at how to move around laterally within a network, with the objective of finding a high-privileged account. You will also...