Wireless Penetration Testing
Comprehensive WiFi, Bluetooth, and RF security assessment guide covering WPA/WPA2/WPA3 cracking, evil twin attacks, BLE exploitation, WPS attacks, captive portal bypass, and cutting-edge wireless attacks.
Why This Matters
Legal Warning
What You'll Learn
- Monitor mode and packet capture
- WPA/WPA2 handshake cracking
- Evil twin and rogue AP attacks
- WPA-Enterprise exploitation
- Bluetooth & BLE attacks
- WPS exploitation and Pixie Dust
- KRACK, FragAttacks, and advanced WPA3 attacks
- Dragonblood SAE side-channel & WPA3 transition downgrade
- SDR signal capture and sub-GHz replay attacks
Methodology Overview
Guide Sections
Setup
Hardware selection, driver installation, VM passthrough. → End state: wlan0mon ready for injection
● BeginnerReconnaissance
airodump-ng scanning, hidden SSID probing, client enumeration. → Tools: airodump-ng, Kismet
● BeginnerWPA Cracking
4-way handshake, PMKID (clientless), GPU cracking. → Tools: aircrack-ng, hashcat
● IntermediateEvil Twin
Rogue AP setup, captive portal credential harvesting. → Tools: hostapd-wpe, Fluxion, eaphammer
● IntermediateEnterprise
802.1X/RADIUS attacks, EAP credential capture, MSCHAP cracking. → Tools: eaphammer, hostapd-wpe
● AdvancedDeauth Attacks
Force client disconnection, handshake harvesting, DoS. → Tools: aireplay-ng, MDK4, Bettercap
● IntermediateWEP Cracking
Legacy IV-capture + ARP replay attacks. Included for legacy system testing. → Tools: aircrack-ng
● BeginnerWPA3 & Wi-Fi 6
SAE/Dragonblood side-channel, OWE downgrade, 6 GHz scanning. → Tools: hcxdumptool, hashcat
● AdvancedSDR & RF Hacking
RTL-SDR/HackRF signal analysis, replay attacks, garage/car fob interception. → Tools: GQRX, URH, Flipper Zero
● AdvancedBluetooth & BLE
BLE MITM, BlueBorne, device tracking, Classic BT PIN attacks. → Tools: Ubertooth, btlejack, bettercap
● IntermediateWPS Attacks
Pixie Dust (offline), Reaver PIN brute force, default vendor PINs. → Tools: Reaver, Bully, wifite2
● IntermediateCaptive Portal Bypass
MAC clone, DNS tunnel, HTTPS bypass for hotel/airport portals. → Tools: macchanger, iodine, sshuttle
● IntermediateAdvanced Attacks
KRACK, FragAttacks, Dragonblood, mesh/Wi-Fi Direct, drone hijacking. → CVEs: 2017-13077, 2020-24588
● AdvancedTools & Hardware
40+ tools, recommended adapters, SDR hardware, Bluetooth sniffers. → Includes: Alfa, HackRF, Ubertooth
● BeginnerPost-Exploitation
Pivoting, ARP spoofing, NTLM relay, lateral movement from wireless to wired. → Tools: Responder, ntlmrelayx, bettercap
● AdvancedRelated Tools
MAC / OUI Analyzer
Identify adapter vendors by MAC address
Subnet Calculator
Calculate ranges for network segmentation
Nmap Builder
Build scan commands for post-compromise recon
Port Reference
Common services discovered post-wireless access
⚠️ Legal Disclaimer
Wireless attacks can affect nearby networks and devices. Only perform these attacks on networks you own or have explicit written authorization to test.
Related Topics
Physical Security
Often combined with wireless attacks for full physical/digital assessments.
Internal Network Pentesting
Post wireless compromise, pivot to internal network testing.
IoT Pentesting
Many IoT devices use WiFi, Bluetooth, Zigbee, and other wireless protocols.
Lab Setup
Build isolated wireless labs for safe practice.