📕
Blog
  • 🐞Vulnerabilities & Techniques
    • Web Vulnerabilities
      • Open Redirect
      • HTTP Parameter Pollution (HPP)
      • Host Header Injection (HHI)
      • XSS
      • HTML-Injection
      • clickjacking
      • S3
      • EXternal Xml Entity (XXE)
      • XSS prevention | CSP
      • DOM-XSS
      • SQL Injection | SQLI
      • Response Manipulation Technique & How Burp Suite Works
    • API Vulnerabilities
      • Mass Assignment Vulnerability
  • 🚩CTF
    • ASCWG
  • ✍️Writeups
    • Read Writeups
      • REST API WriteUps
      • Web Vulnerabilities WriteUps
    • Technical Writeups
      • Reset Password Poisoning Via Host Header Injection Lead to (ATO)
      • OTP/2FA Bypasses
        • OTP bypasses
  • 😈TryHackMe
    • THM Advent of Cyber 3 (2021) NoSQL WriteUp
  • 🔱Web-CyberTalents
    • CyberTalents-Web-Easy
    • CyberTalents-Web-Medium
    • CyberTalents-Web-Hard
  • 🖇️Pentesting & Bug Hunting Tips
    • ATO Via Host Header Injection
    • OTP Bypass
    • OutLook Plugin Pentest Guide
  • 💻Port-Swigger Labs
    • XML external entity (XXE) injection
    • DOM-XSS
      • DOM XSS in the document.write sink using source location.search
      • Lab: DOM XSS in document.write sink using source location.search inside a select element
      • Lab: DOM XSS in innerHTML sink using source location.search
      • Lab: DOM XSS in jQuery anchor href attribute sink using location.search source
      • Lab: Reflected DOM XSS
      • Lab: Stored DOM XSS
    • SQL injection
      • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
      • Lab: SQL injection vulnerability allowing login bypass
      • Lab: SQL injection UNION attack, determining the number of columns returned by the query
      • Lab: SQL injection UNION attack, finding a column containing text
      • Lab: SQL injection UNION attack, retrieving data from other tables
      • Lab: SQL injection UNION attack, retrieving multiple values in a single column
      • Lab: SQL injection attack, querying the database type and version on Oracle
      • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
      • Lab: SQL injection attack, listing the database contents on non-Oracle databases
  • 🛜Wireless Networks Penetration Testing
  • ⚔️Wi-Fi Attacks
    • 🕸️Network Scanning attack
    • 🌊DOS / Flooding
      • 1️⃣DoS - Frame Flooding (Deauth, EAPOL, Beacons)
      • 2️⃣DoS- Exploiting Countermeasures (MIC failure)
    • Jamming Attacks (هجمات التشويش)
    • Probe Requests Attack
    • Handshake Attacks
      • Dictionary Attack
      • Clientless Attack
      • KRACK Attack
      • Downgrad Attack
    • Rouge AP Attack
  • Lab Notes
  • RFID and NFC
  • Bluetooth
  • ZigBee
  • Google Map Test
Powered by GitBook
On this page
  • Types of Network Scanning
  • WI-FI Scanning Tools
  1. Wi-Fi Attacks

Network Scanning attack

PreviousWi-Fi AttacksNextDOS / Flooding

Last updated 10 months ago

Types of Network Scanning

Passive Scanning:

The attacker listens to the Wi-Fi traffic without transmitting any data. This allows them to gather information about nearby networks and devices without being detected.

Purpose: To collect data such as network SSIDs, MAC addresses, signal strength, channel information, and possibly even unencrypted traffic.

Active Scanning:

The attacker sends probe requests to elicit responses from nearby Wi-Fi networks and devices. This type of scanning involves actively transmitting packets.

Purpose: To discover hidden networks (those that do not broadcast their SSIDs) and gather more detailed information about the network infrastructure.

WI-FI Scanning Tools

Passive Scanning Tools

Wireshark:

Description: A network protocol analyzer that captures and analyzes network traffic. Purpose: To inspect packet details, analyze protocols, and detect anomalies in Wi-Fi traffic.

Kismet:

Description: A wireless network detector, sniffer, and intrusion detection system. Purpose: To passively capture traffic, detect hidden networks, and identify devices connected to Wi-Fi networks.

Active Scanning Tools

NetStumbler:

Description: A tool for Windows that detects Wi-Fi networks. Purpose: To find open networks, measure signal strength, and log network data.

Acrylic Wi-Fi:

Description: A Windows-based Wi-Fi scanner. Purpose: To provide detailed information about nearby networks, including SSID, MAC addresses, channels, and encryption types.

Network Enumeration Tools

Aircrack-ng:

Description: A suite of tools for assessing Wi-Fi network security. Purpose: To capture packets, deauthenticate clients, and perform brute-force attacks to crack WEP and WPA-PSK keys.

:

Description: A Wi-Fi network scanner for Windows and macOS. Purpose: To map out network coverage, detect signal overlap, and identify interference sources.

Beacon Frame Spoofing Tools

mdk3:

Description: A tool for various wireless network attacks. Purpose: To create fake beacon frames, perform de-authentication attacks, and more.

aireplay-ng:

Description: Part of the Aircrack-ng suite, used for packet injection. Purpose: To generate de-authentication frames and other packets to disrupt network communications.

⚔️
🕸️
Active vs Passive Scanning