Summary

In this chapter, we have examined different tasks that are required to perform a successful attack against any wireless network, wireless adapter configuration, and also how to configure the wireless modem and reconnaissance of APs using tools such as aircrack-ng and Kismet. In this chapter, we also learned about the complete suite of aircrack-ng tools that are used to identify hidden networks, bypass MAC authentication, compromise WPA/WPA2, and WPA enterprise. We also saw how to we can utilize the existing automated tool Wifite to perform a quick capture of handshake and crack passwords offline or with a good dictionary with the use of multiple options. Then, we took a deep dive into setting up a FakeAP using Fluxion and Ghost Phisher, and performed a DoS attack against the wireless networks.

In the next chapter, we will focus on how to assess a website using a methodology that's specific to this type of access, thereby conducting the reconnaissance and scanning that's necessary to identify vulnerabilities that may be exploitable. We'll see how attackers take advantage of these vulnerabilities with automated tools, such as exploit frameworks and online password cracking. Finally, we'll be able to conduct the most important attacks against a web application, and then leverage this access with a web shell to fully compromise the web services. We will also look into specific services and why and how they are vulnerable to DoS attacks.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.160.219