O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

Following are the steps to carry out the attack:

  1. The first step in carrying out this type of attack is to switch your Wi-Fi adapter into monitoring mode, so we can detect the information we need to detect traffic and their associated MAC addresses. To do this, we run the following commands:
        airmon-ng start wlan0
  
  1. In this case, the command sequence tells Kali to start the airmon-ng process on the wlan0 interface. This application will start the interface in monitoring mode which is very important. Basically, monitor mode in Wi-Fi allows the card to observe all wireless traffic without having to associate to any access point first.
  2. With this done we now wish to see all the connected clients to a specific access point. To ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required