O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identifying promiscuous clients

With a rogue access point in place on a secure (or supposedly secure) network, there now arises a potential for a lot of damage and other mischief to occur. Promiscuous clients are a concern, as these are clients that send out probes looking for wireless networks to attach to that they may have attached to in the past. The fact that they engage in this process it makes the possibility that they may attach to a network accidentally and is a problem for security.

The probe packet is a special type of request that is transmitted out that is used to attach to previously associated network access points. This packet is sent out by smartphones, laptops, and other devices that are not currently connected to a Wi-Fi ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required