Wireless Network Penetration Testing

  1. Attack Methodologies
    1. Legacy Protocol Exploitation
      1. WEP Cryptographic Attacks
        1. Statistical Analysis Methods
          1. FMS Attack
            1. KoreK Attack
              1. PTW Attack
              2. Traffic Injection Techniques
                1. ARP Replay Attack
                  1. Interactive Packet Replay
                    1. Fragmentation Attack
                      1. Chop-Chop Attack
                      2. Packet Collection Optimization
                        1. IV Collection Strategies
                          1. Weak IV Identification
                        2. WEP Cracking Procedures
                          1. Passive Collection Methods
                            1. Active Traffic Generation
                              1. Crack Verification
                            2. WPA/WPA2-PSK Attack Vectors
                              1. Handshake Capture Techniques
                                1. Passive Monitoring
                                  1. Client Deauthentication
                                    1. Timing Optimization
                                    2. Offline Cracking Methods
                                      1. Dictionary-Based Attacks
                                        1. Wordlist Selection
                                          1. Custom Dictionary Creation
                                          2. Brute-Force Approaches
                                            1. Character Set Definition
                                              1. Length Optimization
                                              2. Rule-Based Attacks
                                                1. Transformation Rules
                                                  1. Pattern Analysis
                                                  2. Hybrid Attacks
                                                    1. Dictionary-Rule Combinations
                                                  3. PMKID Attack Methods
                                                    1. PMKID Extraction
                                                      1. Hash Format Conversion
                                                        1. Cracking Optimization
                                                        2. Rainbow Table Attacks
                                                          1. Precomputed Hash Tables
                                                            1. SSID-Specific Tables
                                                              1. Storage Requirements
                                                            2. Enterprise Network Attacks
                                                              1. EAP Protocol Exploitation
                                                                1. EAP Method Identification
                                                                  1. Weakness Assessment
                                                                    1. Downgrade Attacks
                                                                    2. Credential Harvesting
                                                                      1. Rogue Access Point Deployment
                                                                        1. Evil Twin Attacks
                                                                          1. Captive Portal Techniques
                                                                          2. Certificate-Based Attacks
                                                                            1. Certificate Validation Bypass
                                                                              1. Man-in-the-Middle Positioning
                                                                              2. RADIUS Server Attacks
                                                                                1. Authentication Bypass
                                                                                  1. Credential Interception
                                                                                2. WPS Exploitation Techniques
                                                                                  1. PIN-Based Attacks
                                                                                    1. Brute-Force PIN Cracking
                                                                                      1. PIN Structure Analysis
                                                                                        1. Rate Limiting Bypass
                                                                                        2. Pixie-Dust Attacks
                                                                                          1. Weak Random Number Generation
                                                                                            1. Offline PIN Recovery
                                                                                              1. Implementation Vulnerabilities
                                                                                              2. WPS Detection and Enumeration
                                                                                                1. WPS Status Verification
                                                                                                  1. Locked State Detection
                                                                                                2. WPA3 Security Assessment
                                                                                                  1. SAE Protocol Analysis
                                                                                                    1. Dragonfly Handshake
                                                                                                      1. Password Element Derivation
                                                                                                      2. Downgrade Attack Vectors
                                                                                                        1. Transition Mode Exploitation
                                                                                                          1. Protocol Negotiation Manipulation
                                                                                                          2. Side-Channel Attacks
                                                                                                            1. Timing Analysis
                                                                                                              1. Cache-Based Attacks
                                                                                                                1. Implementation Flaws