Chapter 2. Wireless Network Scanning

Scanning wireless networks in the target environment and collecting information about the access points and clients connected to them are the primary tasks in any wireless pentest. The outcome of the scanning phase is a list of access points in operation, connected wireless clients, MAC addresses of APs and clients, the channel(s) they are operating on, the signal strength, the authentication methods deployed, and the encryption schemes being used.

In this chapter, we will be covering the following topics:

  • The 802.11 terminology
  • 802.11 network composition
  • Scanning tools

Wireless network discovery

Scanning wireless networks is often called wireless network discovery or Stumbling, which is an act of discovering available ...

Get Mastering Kali Linux Wireless Pentesting now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.