-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Kali Linux Wireless Penetration Testing Beginner???s Guide
By :

Follow these instructions to get started:
In the previous labs, we used a client that had connected to the Wireless Lab
access point. Let's switch on the client but not the actual Wireless Lab
access point. Let's now run airodump-ng wlan0mon
and check the output. You will very soon find the client to be in the not associated
mode and probing for Wireless Lab
and other SSIDs in its stored profile:
To understand what is happening, let's run Wireshark and start sniffing on the wlan0mon
interface. As expected, you might see a lot of packets that are not relevant to our analysis. Apply a Wireshark filter to only display Probe Request packets from the client MAC you are using. The filter should be wlan.addr==<your mac> && wlan.fc.subtype==0x04)
:
You should now see Probe Request packets only from the client for the previously identified SSIDs.
Let's now start a fake access point for the network Wireless Lab
on the hacker machine...
Change the font size
Change margin width
Change background colour