Gaining access is the second phase of network penetration testing, which enables us to launch more potent attacks and gather more precise information. For unencrypted networks, we can easily connect to the network and sniff out unencrypted data. Similarly, if it’s a wired network, we can use a cable to connect to it, possibly by changing our MAC address. However, if the target uses encryption such as WEP, WPA, WPA2, we need to decrypt it to proceed further. This chapter focuses on how to break the encryption and gain access to the networks that use WEP/WPA/WPA2.
Gaining Access
Through this section, you will get to know about the below topics.
- WEP Introduction
- WEP cracking
- Fake authentication attack
- ARP request replay
- WPA theory
- Handshake theory
- Capturing handshakes
- Creating wordlists
- Wordlist cracking
- Securing network from attacks
For further information on Gaining Access in Ethical Hacking, make sure to follow us at tutorials.freshersnow.com.