- Mastering Kali Linux Wireless Pentesting
- Jilumudi Raghu Ram Brian Sak
- 179字
- 2021-07-16 13:13:40
Summary
Wireless network identification is an essential part of security assessment. It is accomplished through the process of wireless scanning. Scanning can be broadly categorized into two categories: passive scanning and active scanning. In passive scanning, the client station listens for the beacon frames emitted from the access points at regular intervals and also monitors the network for data frames and other indicators of the network presence. In this mode, the client station does not actively probe the target network. In active scanning, the client stations, in addition to listening for beacon frames from the access points, probe the target network in order to detect WLANs. This mode of scanning leaves some forensic data in the network to investigate, making passive scanning the preferred method.
Many tools can be used to identify and categorize target wireless devices and clients and have specific benefits. In this chapter, we discussed various tools, such as airodump-ng, wash, hoover, Kismet, and Wireshark to scan wireless networks.
In the next chapter, we will discuss how to exploit the devices found during the scanning activity.
- 數字媒體應用教程
- C# 2012程序設計實踐教程 (清華電腦學堂)
- PyTorch Artificial Intelligence Fundamentals
- 數據庫系統原理及MySQL應用教程
- Learning Elixir
- SSM輕量級框架應用實戰
- RabbitMQ Essentials
- Android Wear Projects
- Visual C#.NET Web應用程序設計
- Learning Modular Java Programming
- Access 2010數據庫應用技術實驗指導與習題選解(第2版)
- Python大學實用教程
- Java7程序設計入門經典
- Raspberry Pi Blueprints
- 量子計算機編程:從入門到實踐