From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Exploring wireless threats

Exploring wireless threats

- [Lecturer] Whenever I am going to talk about wireless hacking in the next few minutes, I'm going to start with a wifi router, right? So basically, how to attack wifi implementations. Now, what I want to actually start with is even before I show you some of the attacks and some of the resources and so on, is how to even build a lab that we will be successful to perform this type of attacks with built-in adapters in your laptop. Let's say you want to monitor the wifi infrastructure and get the SSID, and in our case we're going to see corp-net is going to be our SSID that we will use in the following demos. In this case, you can use the built-in wireless adapters in your laptops and your desktop machines to join the network, to monitor the network, and so on. But whenever it comes to inject packets into the network, most of the adapters, to be fair, I have not found a single one yet that actually has worked successfully to inject packets into the network. But I haven't tested every…

Contents