tailieunhanh - how to cheat at securing a wireless network phần 10

Sắp xếp tùy chọn có thể được chọn bằng cách nhấn phím như thể hiện trong hình 12, định phân loại xem là thay đổi quan điểm sắp xếp, loại s để đưa lên các tùy chọn sắp xếp. Mạng có thể được sắp xếp theo: | Wireless Penetration Testing Chapter 12 399 Kismet has a wide range of sorting and view options that allow you to learn view information that is not displayed in the main screen. Sort options can be selected by pressing the s key as shown in Figure . Figure The Kismet Sort Options The default sorting view is Auto-Fit. To change the sort view type s to bring up the sort options. Networks can be sorted by The time they were discovered first to last or last to first The MAC address BSSID The network name SSID The number of packets that have been discovered Signal strength The channel on which they are broadcasting The encryption type WEP or No WEP After you choose a sort view information on specific access points can be viewed. Use the arrow keys to highlight a network and then press Enter to get information on the network as shown in Figure . 400 Chapter 12 Wireless Penetration Testing Figure Information on a Specific Network Kismet creates seven log files by default Cisco .cisco Comma Separated Value .csv Packet Dump .dump Global Positioning System Coordinates .gps Network .network Weak IVs .weak Extensible Mark Up Language .xml The range of log files created by Kismet allows pen testers to manipulate the data in many different ways scripts importing to other applications and so forth . Enumeration Tools Once the target network has been located and the type of encryption identified more information needs to be gathered to determine what needs to be done to compromise the network. Kismet is a valuable tool for performing this type of enumeration. It is important to determine the MAC addresses of allowed clients in case the target is filtering by MAC addresses. It is also important to determine the IP Wireless Penetration Testing Chapter 12 401 address range in use so the tester s cards can be configured accordingly that is if DHCP addresses are not being served . Determining allowed client MAC addresses is fairly .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.