O'Reilly logo

Hacking Exposed Wireless, Third Edition by Johnny Cache, Joshua Wright

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2

SCANNING AND ENUMERATING 802.11 NETWORKS

As mentioned in the previous chapter, there are two classes of wireless scanning tools, passive and active. Both types of tools are covered in this chapter. If you already know what operating system you intend to use, you can skip straight to the tools’ portion of the chapter. If you are curious about other platforms, or are trying to determine the advantages of using one versus another, read on.

Choosing an Operating System

In the last chapter, we discussed how various attack techniques rely on the capabilities of the underlying hardware. This hardware depends on device drivers to communicate with the operating system, and device drivers are tied to a specific operating system. In addition, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required