Information gathering

The probability and success factor of every attack depends on information gained through passive and active scanning of the network. Footprinting and reconnaissance are synonyms for the term information gathering.

The following diagram depicts the virtual/physical infrastructure we will be using for our analysis and for replicating the attacks:

The access point is located at 192.168.1.1 and it allocates the IP address to connected devices using DHCP; the attacking box (Kali) is configured with a manual IP address 192.168.1.106.

Get Wireshark 2 Quick Start Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.