Summary

In this chapter, we learned that even the wireless client is susceptible to attacks. These include the Honeypot and other Mis-Association attacks; Caffe Latte attack to retrieve the key from the wireless client; deauthentication and disassociation attacks causing a Denial of service, Hirte attack as an alternative to retrieve the WEP key from a roaming client; and, finally, cracking the WPA-Personal passphrase with just the client.

In the next chapter, we will use what we've learned so far to conduct various advanced wireless attacks on both the client and infrastructure side. So, quickly flip the page to the next chapter!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.88.249