-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Kali Linux Wireless Penetration Testing Beginner???s Guide
By :

"To know your enemy, you must become your enemy." | ||
--Sun Tzu, Art of War |
As a penetration tester, it is important to know the advanced attacks a hacker can do, even if you might not check or demonstrate them during a penetration test. This chapter is dedicated to showing how a hacker can conduct advanced attacks using wireless access as the starting point.
In this chapter, we will take a look at how we can conduct advanced attacks using what we have learned so far. We will primarily focus on the Man-in-the-Middle (MITM) attack, which requires a certain amount of skill and practice to conduct successfully. Once we have done this, we will use this MITM attack as a base from which to conduct more sophisticated attacks such as eavesdropping and session hijacking.
In this chapter, we will cover the following topics:
Change the font size
Change margin width
Change background colour