Chapter 6. Attacking the Client
 | "Security is just as strong as the weakest link." |  |
 | --Famous Quote in Information Security Domain |
Most penetration testers seem to give all their attention to the WLAN infrastructure and don't give the wireless client even a fraction of that. However, it is interesting to note that a hacker can gain access to the authorized network by compromising a wireless client as well.
In this chapter, we will shift our focus from the WLAN infrastructure to the wireless client. The client can be either a connected or isolated unassociated client. We will take a look at the various attacks that can be used to target the client.
We will cover the following topics:
- Honeypot and Misassociation attacks
- The Caffe Latte attack
- Deauthentication and disassociation attacks
- The Hirte attack
- AP-less WPA-Personal cracking