- Kali Linux Wireless Penetration Testing:Beginner's Guide
- Vivek Ramachandran Cameron Buchanan
- 129字
- 2021-07-23 19:45:28
Chapter 2. WLAN and its Inherent Insecurities
"The loftier the building, the deeper the foundation must be laid." |
||
--Thomas Kempis |
Nothing great can be built on a weak foundation, and in our context, nothing secure can be built on something that is inherently insecure.
WLANs, by design, have certain insecurities that are relatively easy to exploit, for example, by packet spoofing, packet injection, and sniffing (this could even happen from far away). We will explore these flaws in this chapter.
In this chapter, we shall look at the following:
- Revisiting WLAN frames
- Different frame types and subtypes
- Using Wireshark to sniff management, control, and data frames
- Sniffing data packets for a given wireless network
- Injecting packets into a given wireless network
Let's get started!
推薦閱讀
- Flask Blueprints
- Learning RabbitMQ
- 青少年軟件編程基礎(chǔ)與實(shí)戰(zhàn)(圖形化編程三級(jí))
- 算法大爆炸:面試通關(guān)步步為營
- PhpStorm Cookbook
- Highcharts Cookbook
- Python機(jī)器學(xué)習(xí)基礎(chǔ)教程
- Bootstrap 4 Cookbook
- Node.js 12實(shí)戰(zhàn)
- Hands-On Robotics Programming with C++
- 數(shù)據(jù)分析與挖掘算法:Python實(shí)戰(zhàn)
- 計(jì)算語言學(xué)導(dǎo)論
- Visual Basic 程序設(shè)計(jì)實(shí)踐教程
- Python高性能編程(第2版)
- 計(jì)算機(jī)應(yīng)用基礎(chǔ)