 |
Pre-Exploitation
This chapter describes the tools and strategies used by the authors to
identify 802.11 wireless device driver vulnerabilities. Section 3.1
provides a basic description of the 802.11 protocol in order to provide the
reader with information necessary to understand the attack surface that is
exposed by 802.11 device drivers. Section 3.2 describes the basic
interface exposed by the 3.0 version of the Metasploit Framework that makes it
possible to craft arbitrary 802.11 packets. Finally, section 3.3
describes a basic approach to fuzzing certain aspects of the way a device
driver handles certain 802.11 protocol functions.
Subsections
|