Chapter 5. Attacks on the WLAN Infrastructure
 | "Thus, what is of supreme importance in war is to attack the enemy's strategy" |  |
 | --Sun Tzu, Art of War |
In this chapter, we will attack the WLAN infrastructure's core! We will focus on how we can penetrate into the authorized network using various new attack vectors and lure authorized clients to connect to us, as an attacker.
The WLAN infrastructure is what provides wireless services to all the WLAN clients in a system. In this chapter, we will take a look at the various attacks that can be conducted against the infrastructure:
- Default accounts and credentials on the access point
- Denial of service attacks
- Evil twin and access point MAC spoofing
- Rogue access points