- Mastering Kali Linux Wireless Pentesting
- Jilumudi Raghu Ram Brian Sak
- 94字
- 2021-07-16 13:13:39
Chapter 2. Wireless Network Scanning
Scanning wireless networks in the target environment and collecting information about the access points and clients connected to them are the primary tasks in any wireless pentest. The outcome of the scanning phase is a list of access points in operation, connected wireless clients, MAC addresses of APs and clients, the channel(s) they are operating on, the signal strength, the authentication methods deployed, and the encryption schemes being used.
In this chapter, we will be covering the following topics:
- The 802.11 terminology
- 802.11 network composition
- Scanning tools
推薦閱讀
- C語言程序設計(第3版)
- 程序設計與實踐(VB.NET)
- Debian 7:System Administration Best Practices
- 自己動手實現Lua:虛擬機、編譯器和標準庫
- Windows系統管理與服務配置
- 基于Java技術的Web應用開發
- Scratch 3.0少兒編程與邏輯思維訓練
- Android 應用案例開發大全(第3版)
- Oracle從入門到精通(第5版)
- Mastering JavaScript High Performance
- Learning R for Geospatial Analysis
- Getting Started with Python and Raspberry Pi
- Emotional Intelligence for IT Professionals
- Mastering HTML5 Forms
- Kotlin語言實例精解