From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Exploiting wireless vulnerabilities

Exploiting wireless vulnerabilities

- [Omar] Whenever I am going to talk about wireless hacking in the next few minutes, I'm going to start with a WIFI router, right? So basically how to attack WIFI implementations. Now, what I want to actually start with is even before I show you some of the attacks and some of the resources and so on, is how to even build a lab that we will be successful to perform these type of attacks. With building adapters in your laptop. Let's say you want to monitor the WIFI infrastructure and get the SSID, and in our case, we're going to see, corp-net is going to be our SSID that we will use in the following demos. In this case, you can use the built-in wireless adapters in your laptops and your desktop machines to join the network, to monitor the network and so on. But whenever it comes to inject packets into the network, most of the adapters, to be fair, I have not found a single one yet that actually has worked successfully to inject packets into the network. But I haven't tested every…

Contents