O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. IEEE 802.11 Wireless Protocol and Perl

In this chapter, we will be writing our own 802.11 protocol analysis tools and scripts for network manipulation tools for 802.11 wireless networks using Perl programming and the Aircrack-ng suite. These attacks and intelligence-gathering techniques are covered in the Penetration Testing Execution Standard (PTES) under Covert Gathering and RF / Wireless and Radio Frequency (RF) Access.

802.11 terminologies and packet analysis

In this section, we will learn how to disassemble and analyze the field values of 802.11 frames by stepping through the frames, similar to what we did in Chapter 4, IEEE 802.3 Wired Network Manipulation with Perl, with a wired Ethernet frame on a per-byte basis. The only difference ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required