- Mastering Kali Linux Wireless Pentesting
- Jilumudi Raghu Ram Brian Sak
- 94字
- 2021-07-16 13:13:39
Chapter 2. Wireless Network Scanning
Scanning wireless networks in the target environment and collecting information about the access points and clients connected to them are the primary tasks in any wireless pentest. The outcome of the scanning phase is a list of access points in operation, connected wireless clients, MAC addresses of APs and clients, the channel(s) they are operating on, the signal strength, the authentication methods deployed, and the encryption schemes being used.
In this chapter, we will be covering the following topics:
- The 802.11 terminology
- 802.11 network composition
- Scanning tools
推薦閱讀
- Data Visualization with D3 4.x Cookbook(Second Edition)
- 在最好的年紀學Python:小學生趣味編程
- PHP網絡編程學習筆記
- jQuery從入門到精通 (軟件開發視頻大講堂)
- Building Minecraft Server Modifications
- 小程序開發原理與實戰
- HTML5入門經典
- Mastering Android Development with Kotlin
- RabbitMQ Essentials
- 批調度與網絡問題的組合算法
- Creating Data Stories with Tableau Public
- Unity&VR游戲美術設計實戰
- 零代碼實戰:企業級應用搭建與案例詳解
- Machine Learning for OpenCV
- FusionCharts Beginner’s Guide:The Official Guide for FusionCharts Suite