- Mastering Kali Linux Wireless Pentesting
- Jilumudi Raghu Ram Brian Sak
- 179字
- 2021-07-16 13:13:40
Summary
Wireless network identification is an essential part of security assessment. It is accomplished through the process of wireless scanning. Scanning can be broadly categorized into two categories: passive scanning and active scanning. In passive scanning, the client station listens for the beacon frames emitted from the access points at regular intervals and also monitors the network for data frames and other indicators of the network presence. In this mode, the client station does not actively probe the target network. In active scanning, the client stations, in addition to listening for beacon frames from the access points, probe the target network in order to detect WLANs. This mode of scanning leaves some forensic data in the network to investigate, making passive scanning the preferred method.
Many tools can be used to identify and categorize target wireless devices and clients and have specific benefits. In this chapter, we discussed various tools, such as airodump-ng, wash, hoover, Kismet, and Wireshark to scan wireless networks.
In the next chapter, we will discuss how to exploit the devices found during the scanning activity.
- Learn TypeScript 3 by Building Web Applications
- ASP.NET Core 5.0開發入門與實戰
- Visual C++實例精通
- Mastering C# Concurrency
- Mastering macOS Programming
- 微信公眾平臺開發:從零基礎到ThinkPHP5高性能框架實踐
- R的極客理想:工具篇
- Oracle 18c 必須掌握的新特性:管理與實戰
- Raspberry Pi Home Automation with Arduino(Second Edition)
- 好好學Java:從零基礎到項目實戰
- Building Serverless Web Applications
- Kotlin極簡教程
- uni-app跨平臺開發與應用從入門到實踐
- Qt 4開發實踐
- Python編程快速上手2