Complete Guide
Intermediate

Wireless Penetration Testing

Comprehensive WiFi, Bluetooth, and RF security assessment guide covering WPA/WPA2/WPA3 cracking, evil twin attacks, BLE exploitation, WPS attacks, captive portal bypass, and cutting-edge wireless attacks.

Why This Matters

Wireless is one of the highest-value attack surfaces on a physical engagement. A single unpatched AP, a rogue device on guest WiFi, or a WPS-enabled router can give an attacker a foothold inside a corporate network in minutes — without ever touching the front door.

Legal Warning

Wireless attacks can affect nearby networks. Only perform these attacks on networks you own or have explicit written authorization to test. Unauthorized wireless attacks are illegal.

What You'll Learn

  • Monitor mode and packet capture
  • WPA/WPA2 handshake cracking
  • Evil twin and rogue AP attacks
  • WPA-Enterprise exploitation
  • Bluetooth & BLE attacks
  • WPS exploitation and Pixie Dust
  • KRACK, FragAttacks, and advanced WPA3 attacks
  • Dragonblood SAE side-channel & WPA3 transition downgrade
  • SDR signal capture and sub-GHz replay attacks

Methodology Overview

Guide Sections

01

Setup

Hardware selection, driver installation, VM passthrough. → End state: wlan0mon ready for injection

02

Reconnaissance

airodump-ng scanning, hidden SSID probing, client enumeration. → Tools: airodump-ng, Kismet

03

WPA Cracking

4-way handshake, PMKID (clientless), GPU cracking. → Tools: aircrack-ng, hashcat

04

Evil Twin

Rogue AP setup, captive portal credential harvesting. → Tools: hostapd-wpe, Fluxion, eaphammer

05

Enterprise

802.1X/RADIUS attacks, EAP credential capture, MSCHAP cracking. → Tools: eaphammer, hostapd-wpe

06

Deauth Attacks

Force client disconnection, handshake harvesting, DoS. → Tools: aireplay-ng, MDK4, Bettercap

07

WEP Cracking

Legacy IV-capture + ARP replay attacks. Included for legacy system testing. → Tools: aircrack-ng

08

WPA3 & Wi-Fi 6

SAE/Dragonblood side-channel, OWE downgrade, 6 GHz scanning. → Tools: hcxdumptool, hashcat

09

SDR & RF Hacking

RTL-SDR/HackRF signal analysis, replay attacks, garage/car fob interception. → Tools: GQRX, URH, Flipper Zero

10

Bluetooth & BLE

BLE MITM, BlueBorne, device tracking, Classic BT PIN attacks. → Tools: Ubertooth, btlejack, bettercap

11

WPS Attacks

Pixie Dust (offline), Reaver PIN brute force, default vendor PINs. → Tools: Reaver, Bully, wifite2

12

Captive Portal Bypass

MAC clone, DNS tunnel, HTTPS bypass for hotel/airport portals. → Tools: macchanger, iodine, sshuttle

13

Advanced Attacks

KRACK, FragAttacks, Dragonblood, mesh/Wi-Fi Direct, drone hijacking. → CVEs: 2017-13077, 2020-24588

14

Tools & Hardware

40+ tools, recommended adapters, SDR hardware, Bluetooth sniffers. → Includes: Alfa, HackRF, Ubertooth

Related Tools

Ready to Begin?

Start by setting up your wireless interface in monitor mode.

Start the Guide

⚠️ Legal Disclaimer

Wireless attacks can affect nearby networks and devices. Only perform these attacks on networks you own or have explicit written authorization to test.