Chapter 5. IEEE 802.11 Wireless Protocol and Perl

In this chapter, we will be writing our own 802.11 protocol analysis tools and scripts for network manipulation tools for 802.11 wireless networks using Perl programming and the Aircrack-ng suite. These attacks and intelligence-gathering techniques are covered in the Penetration Testing Execution Standard (PTES) under Covert Gathering and RF / Wireless and Radio Frequency (RF) Access.

802.11 terminologies and packet analysis

In this section, we will learn how to disassemble and analyze the field values of 802.11 frames by stepping through the frames, similar to what we did in Chapter 4, IEEE 802.3 Wired Network Manipulation with Perl, with a wired Ethernet frame on a per-byte basis. The only difference ...

Get Penetration Testing with Perl now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.