CHAPTER 2

SCANNING AND ENUMERATING 802.11 NETWORKS

As mentioned in the previous chapter, there are two classes of wireless scanning tools, passive and active. Both types of tools are covered in this chapter. If you already know what operating system you intend to use, you can skip straight to the tools’ portion of the chapter. If you are curious about other platforms, or are trying to determine the advantages of using one versus another, read on.

Choosing an Operating System

In the last chapter, we discussed how various attack techniques rely on the capabilities of the underlying hardware. This hardware depends on device drivers to communicate with the operating system, and device drivers are tied to a specific operating system. In addition, ...

Get Hacking Exposed Wireless, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.