

Note that this post is for educational purposes only and should not be used, under any circumstances, on networks that you do not own. Key reinstallation attacks (KRACK) are not covered in depth in this post as they might not be the most feasible attack in a short wireless engagement, although determining whether access points (APs) are vulnerable to the KRACK attack would be valuable information.Particularly disruptive techniques (e.g.Much older and highly insecure protocols such as WEP – just don’t use it.A brief outline of several wireless configuration scenarios and a high-level overview of testing these networks from a security standpoint.The Aircrack-ng suite and Kismet are the defacto standards in assessing wireless networks and both can give you information on the networks in range, their encryption, authentication, connected clients, and more. Granted, some configurations of wireless networks are currently “impenetrable,” however, literally a single missing setting (certificate validation server-side and client-side) can be the bane of an enterprise wireless network. Testing of these networks is frequently overlooked despite the fact that they are common in corporate environments and usually offer direct access to internal network segments. Improperly configured wireless networks are often an easy way into a target network.
