Wireless Security - Wi-Fi Pen TestingUploader: Nashakar 8 month ago Subscribe 8290
Pentesting of the wireless systems is easier task than doing that on the wired network. As you have seen so far, there are numerous tools ready and waiting for you to use. On other hand, if it was not enough, there is a second phase, the active one. Some of the tests may already stop at that point. During the passive phase, the penetration tester or an w lan penetration software collects the information about its target. As the reader will go through them, it will be very easy to spot when passive phase ends and when the active one starts. This is where attackers directly interact with the victim. For that use, you would need an external wireless adapter description of the good wireless cards were conducted in the initial chapters of this tutorial. All the attacks described in this chapter belong to passive or a combination of passive and active ones. You cannot really apply good physical security measures w lan penetration software a wireless medium, if you are located close enough, you are able to "hear" or w lan penetration software least your wireless adapter is able to hear everything, that is flowing over the air.