- Kali Linux Wireless Penetration Testing:Beginner's Guide
- Vivek Ramachandran Cameron Buchanan
- 129字
- 2021-07-23 19:45:28
Chapter 2. WLAN and its Inherent Insecurities
"The loftier the building, the deeper the foundation must be laid." |
||
--Thomas Kempis |
Nothing great can be built on a weak foundation, and in our context, nothing secure can be built on something that is inherently insecure.
WLANs, by design, have certain insecurities that are relatively easy to exploit, for example, by packet spoofing, packet injection, and sniffing (this could even happen from far away). We will explore these flaws in this chapter.
In this chapter, we shall look at the following:
- Revisiting WLAN frames
- Different frame types and subtypes
- Using Wireshark to sniff management, control, and data frames
- Sniffing data packets for a given wireless network
- Injecting packets into a given wireless network
Let's get started!
推薦閱讀
- Flutter開發(fā)實(shí)戰(zhàn)詳解
- Java EE 6 企業(yè)級應(yīng)用開發(fā)教程
- Raspberry Pi Networking Cookbook(Second Edition)
- Python爬蟲開發(fā)與項(xiàng)目實(shí)戰(zhàn)
- C語言程序設(shè)計(jì)
- 深入淺出RxJS
- 程序員修煉之道:通向務(wù)實(shí)的最高境界(第2版)
- ASP.NET程序設(shè)計(jì)教程
- 程序是怎樣跑起來的(第3版)
- UML 基礎(chǔ)與 Rose 建模案例(第3版)
- Java面向?qū)ο蟪绦蛟O(shè)計(jì)
- Kotlin開發(fā)教程(全2冊)
- Python 3 Object:oriented Programming(Second Edition)
- Arduino電子設(shè)計(jì)實(shí)戰(zhàn)指南:零基礎(chǔ)篇
- HTML5游戲開發(fā)實(shí)戰(zhàn)