Time for action – collecting data

Follow the given instructions to get started:

  1. First of all, we need a device that's looking for multiple networks. Generally, a normal smartphone such as an Android device or iPhone will do the trick. Desktops don't generally make good targets as they tend to remain in one location. Newer iPhones and Android devices may have probe requests disabled or obfuscated, so do check before you give up.
  2. Once you have your device, make sure the Wi-Fi is turned on.
  3. Then set up your monitoring interface as we have done many times before:
    Time for action – collecting data
  4. The next thing to be done is to look for probe requests with tshark via the following command: ...

Get Kali Linux Wireless Penetration Testing : Beginner's Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.