Chapter 7 – Wireless Client Attacks
- Cassola, Aldo, Robertson, William, Kirda, Engin, Noubir, Guevara, A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication, available at http://seclab.ccs.neu.edu/static/publications/ndss2013wpa.pdf
- Gopinath, K.N., Multipot: A More Potent Variant of Evil Twin available at https://www.defcon.org/html/links/dc-archives/dc-15-archive.html#Gopinath
- Man-in-the-middle attack, https://www.owasp.org/index.php/Man-in-the-middle_attack
- Ettercap, https://ettercap.github.io/ettercap/
- Ghost-phisher available at https://github.com/savio-code/ghost-phisher
- The Caffe Latte attack available at http://www.slideshare.net/AirTightWIPS/toorcon-caffe-latte-attack
- The Caffe Latte attack with the aircrack-ng suite available at http://www.aircrack-ng.org/doku.php?id=cafe-latte
- The Hirte attack available at http://www.aircrack-ng.org/doku.php?id=hirte