- Kali Linux Wireless Penetration Testing Beginner's Guide(Third Edition)
- Cameron Buchanan Vivek Ramachandran
- 327字
- 2021-07-02 20:05:42
Revisiting WLAN frames
As this book deals with the security aspects of wireless, we will assume that you already have a basic understanding of the protocol and the packet headers. If not, or if it's been some time since you worked on wireless, this would be a good time to revisit this topic again.
Let's now quickly review some basic concepts of WLANs that most of you may already be aware of. In WLANs, communication happens over frames. A frame would have the following header structure:

The Frame Control
field itself has a more complex structure:

The Type
field defines three types of WLAN frame:
- Management frames: Management frames are responsible for maintaining communication between access points and wireless clients. Management frames can have the following subtypes:
- Authentication
- Deauthentication
- Association request
- Association response
- Reassociation request
- Reassociation response
- Disassociation
- Beacon
- Probe request
- Probe response
- Control frames: Control frames are responsible for ensuring a proper exchange of data between access points and wireless clients. Control frames can have the following subtypes:
- Request to Send (RTS)
- Clear to Send (CTS)
- Acknowledgement (ACK)
- Data frames: Data frames carry the actual data that is sent on the wireless network. There are no subtypes for data frames.
We will discuss the security implications of each of these frames when we discuss different attacks in later chapters.
We will now look at how to sniff these frames over a wireless network using Wireshark. There are other tools—such as Airodump-NG, Tcpdump, or Tshark—that you can use for sniffing as well. We will, however, mostly use Wireshark in this book, but we encourage you to explore other tools as well. The first step to do this is to create a monitor mode interface. This will create an interface for our adapter, which allows us to read all wireless frames in the air, regardless of whether they are destined for us or not. In the wired world, this is popularly called promiscuous mode.
- Mastering Ext JS(Second Edition)
- 劍指JVM:虛擬機實踐與性能調優
- Visual C++串口通信技術詳解(第2版)
- Scratch 3.0少兒編程與邏輯思維訓練
- Flash CS6中文版應用教程(第三版)
- 學習正則表達式
- Mastering JavaScript High Performance
- Nginx Lua開發實戰
- 精通Python自動化編程
- PHP+MySQL+Dreamweaver動態網站開發從入門到精通(第3版)
- Cybersecurity Attacks:Red Team Strategies
- 編程可以很簡單
- 人工智能算法(卷1):基礎算法
- Practical GIS
- Robot Framework Test Automation