March 2021
Intermediate to advanced
400 pages
14h 24m
English
There are numerous open source and commercial tools to help administrators perform wireless audits. Discovery tools such as AirMagnet, Acrylic, or Xirrus Wi-Fi Inspector help verify what is actually in place (as opposed to what’s on a diagram), showing the network’s true status. The next stage is to check the network for known vulnerabilities by using vulnerability scanners such as Nessus. This software checks network clients against a national database of thousands of contemporary known OS and application vulnerabilities.
After vulnerabilities have been identified and removed, it’s time to bring out the big guns: pentesters. Pentesters are fully developed frameworks of tools that enable auditors not only to verify vulnerabilities ...