UsefulLinks
Computer Science
Cybersecurity
Wireless Network Penetration Testing
1. Introduction to Wireless Penetration Testing
2. Wireless Networking Fundamentals
3. Wireless Security Mechanisms
4. Laboratory Setup and Tools
5. Reconnaissance and Information Gathering
6. Attack Methodologies
7. Client-Side and Advanced Attacks
8. Post-Exploitation Activities
9. Denial of Service Attacks
10. Defense Evasion Techniques
11. Defensive Countermeasures
12. Specialized Wireless Protocols
13. Documentation and Reporting
9.
Denial of Service Attacks
9.1.
Layer 2 DoS Techniques
9.1.1.
Deauthentication Floods
9.1.1.1.
Broadcast Deauthentication
9.1.1.2.
Targeted Client Attacks
9.1.1.3.
Continuous Attack Patterns
9.1.2.
Disassociation Attacks
9.1.2.1.
Client Disconnection
9.1.2.2.
Service Disruption
9.1.3.
Authentication Floods
9.1.3.1.
Resource Exhaustion
9.1.3.2.
Access Point Overload
9.2.
Control Frame Exploitation
9.2.1.
CTS/RTS Manipulation
9.2.1.1.
Medium Access Control
9.2.1.2.
Channel Reservation Abuse
9.2.2.
Power Save Attacks
9.2.2.1.
Sleep State Manipulation
9.2.2.2.
Battery Drain Attacks
9.3.
Physical Layer Attacks
9.3.1.
RF Jamming Concepts
9.3.1.1.
Continuous Wave Jamming
9.3.1.2.
Pulse Jamming
9.3.1.3.
Sweep Jamming
9.3.2.
Interference Generation
9.3.2.1.
Microwave Interference
9.3.2.2.
Bluetooth Interference
9.3.3.
Signal Analysis
9.3.3.1.
Spectrum Monitoring
9.3.3.2.
Interference Detection
Previous
8. Post-Exploitation Activities
Go to top
Next
10. Defense Evasion Techniques