CHAPTER SUMMARY
There are numerous open-source and commercial tools to help administrators perform wireless audits. Discovery tools, such as AirCheck G3 Pro, Acrylic, or Ekahau Analyzer, help verify what is actually in place (as opposed to what’s on a diagram), showing the network’s true status. The next stage is to check the network for known vulnerabilities by using vulnerability scanners, such as Nessus. This software checks network clients against a national database of thousands of contemporary known OS and application vulnerabilities.
After vulnerabilities have been identified and removed, it’s time to bring out the big guns: pentesters. Pentesters are fully developed frameworks of tools that enable auditors not only to verify vulnerabilities ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access