Time for action – discovering wireless devices
Follow the given instructions to get started:
Create a monitor mode interface using your card as shown in the following screenshot:
Use
airodump-ng
to start scanning the airspace. Ensure that channel hopping happens across both the802.11
b
andg
bands
:Move around the premises to get as many clients and access points as possible:
Request from the system administrator of the company a list of MAC addresses for all access points and wireless clients. This will help us in the next phase:
What just happened?
We took a scan of the entire wireless network in the area. This now gives us a clear idea about what is in the air. This is the starting point of the exercise. Now we will analyze this dump and do an actual penetration attack in the Attack phase.
Attack
Now that we understand what is in the airspace of the authorized network, we need to break the problem into smaller parts.
In our attacking phase, we will explore the following:
Finding rogue access...