The use of wireless networks permeates all organizations. As with any system that we have explored so far, there are vulnerabilities with wireless networks as well. These vulnerabilities, in the way that traffic is encrypted or in the methods of authentication, can be leveraged with tools that Kali Linux supplies. Demonstrating these vulnerabilities and their associated exploits by penetration testers provides those that employ these types of networks a clear understanding of what measures they need employ in order to safeguard themselves from attacks. As the world moves to an increasingly wireless world, with smartphones, laptops, and the Internet of Things, it is crucial that wireless networks and their security controls are constantly tested.
In the next chapter, we are going to discuss wireless networking as part of a larger methodology of penetration testing: using...