官术网_书友最值得收藏!

Summary

Wireless network identification is an essential part of security assessment. It is accomplished through the process of wireless scanning. Scanning can be broadly categorized into two categories: passive scanning and active scanning. In passive scanning, the client station listens for the beacon frames emitted from the access points at regular intervals and also monitors the network for data frames and other indicators of the network presence. In this mode, the client station does not actively probe the target network. In active scanning, the client stations, in addition to listening for beacon frames from the access points, probe the target network in order to detect WLANs. This mode of scanning leaves some forensic data in the network to investigate, making passive scanning the preferred method.

Many tools can be used to identify and categorize target wireless devices and clients and have specific benefits. In this chapter, we discussed various tools, such as airodump-ng, wash, hoover, Kismet, and Wireshark to scan wireless networks.

In the next chapter, we will discuss how to exploit the devices found during the scanning activity.

主站蜘蛛池模板: 姚安县| 临海市| 安顺市| 靖州| 冷水江市| 新宾| 偏关县| 乐昌市| 灵台县| 伊金霍洛旗| 景洪市| 类乌齐县| 三都| 贡嘎县| 韩城市| 大厂| 临洮县| 普宁市| 邵阳县| 汤阴县| 安仁县| 宁都县| 濉溪县| 揭东县| 澄迈县| 宝清县| 彭阳县| 江达县| 湖北省| 土默特右旗| 拜泉县| 福泉市| 东兰县| 东乌珠穆沁旗| 富锦市| 桐柏县| 崇文区| 夏津县| 祥云县| 鄂托克前旗| 临湘市|