For much of our previous discussion, we have looked at techniques that involve penetration testing while connected to a wired network. This included both internal Local Area Networking (LAN) and techniques such as web application assessments over the public internet. One area of focus that deserves attention is wireless networking. Wireless networks are ubiquitous, having been deployed in a variety of environments, such as commercial, government, educational, and residential environments. As a result, penetration testers should ensure that these networks have the appropriate amount of security controls and are free from configuration errors.
In this chapter, we will discuss the following topics:
- Wireless networking: In this topic, we address the underlying protocols and configuration that govern how clients, such as laptops and tablets, authenticate and communicate with wireless-network access points.
- Reconnaissance: Just like in a penetration test that we conduct over a wired connection, there are tools within Kali Linux and others that can be added and leveraged to identify potential target networks, as well as other configuration information we can leverage during an attack.
- Authentication attacks: Unlike attempting to compromise a remote server, the attacks we will discuss revolve around gaining authenticated access to the wireless network. Once authenticated, we can connect and then put into action the tools and techniques we have previously examined.
- What to do after authentication: Here, we will discuss some of the actions that can be taken after the authentication mechanism has been cracked. These include attacks against the access points and how to bypass a common security control implemented into wireless networks. Sniffing wireless network traffic to gain access to credentials or other information is also addressed.
Having a solid understanding of wireless network penetration testing is becoming more and more important. Technology is rapidly adopting the concept of the Internet of Things (IoT), which aims to move more and more of our devices that are used for comfort and convenience to the internet. Facilitating this advance will be wireless networks.
As a result, more and more of these networks will be needed, which corresponds to an increase in the attack surface. Clients and organizations will need to understand the risks and how attackers go about attacking these systems.