Planning

In this phase, we must understand the following:

  • Scope of the assessment: The penetration tester should work with the client to define a scope that is achievable and will also provide the greatest amount of insight into the security of a network. Typically, the following information is gathered:
    • Location of the penetration test
    • Total coverage area of the premises
    • Approximate number of access points and wireless clients deployed
    • Which wireless networks are included in the assessment?
    • Is exploitation in scope?
    • Are attacks against users in scope?
    • Is denial of service in scope?
  • Effort estimation: Based on the scope defined, the tester will then have to estimate how much time is required. Bear in mind that rescoping may occur following this estimate, ...

Get Kali Linux Wireless Penetration Testing : Beginner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.