Chapter 7. Advanced WLAN Attacks
 | "To know your enemy, you must become your enemy." |  |
 | --Sun Tzu, Art of War |
As a penetration tester, it is important to know the advanced attacks a hacker can do, even if you might not check or demonstrate them during a penetration test. This chapter is dedicated to showing how a hacker can conduct advanced attacks using wireless access as the starting point.
In this chapter, we will take a look at how we can conduct advanced attacks using what we have learned so far. We will primarily focus on the Man-in-the-Middle (MITM) attack, which requires a certain amount of skill and practice to conduct successfully. Once we have done this, we will use this MITM attack as a base from which to conduct more sophisticated attacks such as eavesdropping and session hijacking.
In this chapter, we will cover the following topics:
- MITM attack
- Wireless eavesdropping using MITM
- Session hijacking using MITM