官术网_书友最值得收藏!

Summary

Wireless network identification is an essential part of security assessment. It is accomplished through the process of wireless scanning. Scanning can be broadly categorized into two categories: passive scanning and active scanning. In passive scanning, the client station listens for the beacon frames emitted from the access points at regular intervals and also monitors the network for data frames and other indicators of the network presence. In this mode, the client station does not actively probe the target network. In active scanning, the client stations, in addition to listening for beacon frames from the access points, probe the target network in order to detect WLANs. This mode of scanning leaves some forensic data in the network to investigate, making passive scanning the preferred method.

Many tools can be used to identify and categorize target wireless devices and clients and have specific benefits. In this chapter, we discussed various tools, such as airodump-ng, wash, hoover, Kismet, and Wireshark to scan wireless networks.

In the next chapter, we will discuss how to exploit the devices found during the scanning activity.

主站蜘蛛池模板: 大同县| 崇仁县| 津南区| 霍州市| 阳高县| 洱源县| 澄迈县| 乌海市| 乐都县| 达孜县| 平阴县| 泾源县| 广州市| 翼城县| 阿拉善右旗| 古交市| 桂东县| 玉屏| 新巴尔虎左旗| 南投县| 诏安县| 大名县| 康保县| 淮安市| 惠州市| 绵阳市| 尖扎县| 冷水江市| 东乌| 望奎县| 普兰店市| 安溪县| 大石桥市| 方城县| 左云县| 东乌| 黄平县| 双辽市| 游戏| 久治县| 昌邑市|