Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Summary


In this chapter, we learned how to conduct advanced attacks using wireless as the base. We created a setup for a MITM attack over wireless and then used it to eavesdrop on the victim's traffic. We then used the same setup to hijack the application layer of the victim (web traffic, to be specific) using a DNS poisoning attack.

In the next chapter, we will learn how to conduct a wireless penetration test right from the planning, discovery, and attack to the reporting stage. We will also touch upon the best practices to secure WLANs.