How to do it...

  1. We will start by using the Windows Gather Wireless Current Connection Info post-exploitation module to gather information about the current connection on each wireless LAN interface, on the target machine:
  1. Next, we can use the Windows Gather Wireless BSS Info post-exploitation module to gather information about the wireless basic service sets available to the victim machine:

Using the output of this module we can, for example, use WiGLE, a website for collecting information about the different wireless hotspots around the ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.