UsefulLinks
Computer Science
Cybersecurity
Wireless Network Penetration Testing
1. Introduction to Wireless Penetration Testing
2. Wireless Networking Fundamentals
3. Wireless Security Mechanisms
4. Laboratory Setup and Tools
5. Reconnaissance and Information Gathering
6. Attack Methodologies
7. Client-Side and Advanced Attacks
8. Post-Exploitation Activities
9. Denial of Service Attacks
10. Defense Evasion Techniques
11. Defensive Countermeasures
12. Specialized Wireless Protocols
13. Documentation and Reporting
7.
Client-Side and Advanced Attacks
7.1.
Rogue Infrastructure Deployment
7.1.1.
Access Point Impersonation
7.1.1.1.
SSID Cloning
7.1.1.2.
BSSID Spoofing
7.1.1.3.
Beacon Parameter Matching
7.1.2.
Karma Attack Implementation
7.1.2.1.
Probe Response Manipulation
7.1.2.2.
Automatic Client Association
7.1.3.
MANA Attack Framework
7.1.3.1.
Enhanced Client Targeting
7.1.3.2.
Credential Collection
7.1.4.
Captive Portal Development
7.1.4.1.
Social Engineering Integration
7.1.4.2.
Credential Harvesting Forms
7.1.4.3.
SSL Certificate Spoofing
7.2.
Traffic Interception and Manipulation
7.2.1.
Layer 2 Attack Techniques
7.2.1.1.
ARP Spoofing Implementation
7.2.1.2.
MAC Address Manipulation
7.2.2.
DNS Manipulation
7.2.2.1.
DNS Response Modification
7.2.2.2.
Domain Redirection
7.2.2.3.
Cache Poisoning
7.2.3.
SSL/TLS Attacks
7.2.3.1.
SSL Stripping
7.2.3.2.
Certificate Substitution
7.2.3.3.
Protocol Downgrade
7.2.4.
Session Hijacking
7.2.4.1.
Cookie Theft
7.2.4.2.
Session Token Manipulation
7.3.
Client Device Exploitation
7.3.1.
Preferred Network List Attacks
7.3.1.1.
PNL Enumeration
7.3.1.2.
Automatic Connection Exploitation
7.3.2.
Client Vulnerability Assessment
7.3.2.1.
Software Version Detection
7.3.2.2.
Patch Level Analysis
7.3.3.
Caffe Latte Attack
7.3.3.1.
Client-to-Client Communication
7.3.3.2.
WEP Key Recovery
7.3.4.
Ad-Hoc Network Exploitation
7.3.4.1.
Peer-to-Peer Attacks
7.3.4.2.
Direct Client Targeting
Previous
6. Attack Methodologies
Go to top
Next
8. Post-Exploitation Activities