Chapter 5. IEEE 802.11 Wireless Protocol and Perl
In this chapter, we will be writing our own 802.11 protocol analysis tools and scripts for network manipulation tools for 802.11 wireless networks using Perl programming and the Aircrack-ng suite. These attacks and intelligence-gathering techniques are covered in the Penetration Testing Execution Standard (PTES) under Covert Gathering and RF / Wireless and Radio Frequency (RF) Access.
802.11 terminologies and packet analysis
In this section, we will learn how to disassemble and analyze the field values of 802.11 frames by stepping through the frames, similar to what we did in Chapter 4, IEEE 802.3 Wired Network Manipulation with Perl, with a wired Ethernet frame on a per-byte basis. The only difference ...