Wireless and Bluetooth Attacks
The dominance of mobile devices has led the majority of companies to adopt Bring Your Own Devices (BYOD) and the need to provide instant network connectivity, with wireless networks becoming the ubiquitous access point to the internet. Unfortunately, the convenience of wireless access is accompanied by an increase in effective attacks that result in the theft of data and unauthorized access, as well as the denial of service of network resources. Kali provides several tools to configure and launch these wireless attacks, allowing organizations to improve security.
In this chapter, we will examine several housekeeping tasks and wireless attacks, including the following topics:
- Configuring Kali for wireless and Bluetooth attacks
- Wireless and Bluetooth reconnaissance
- Bypassing a hidden Service Set Identifier (SSID)
- Bypassing MAC address authentication and open authentication
- Compromising WPA/WPA2 encryption and performing...