Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Time for action – collecting data


Follow the given instructions to get started:

  1. First of all, we need a device that's looking for multiple networks. Generally, a normal smartphone such as an Android device or iPhone will do the trick. Desktops don't generally make good targets as they tend to remain in one location. Newer iPhones and Android devices may have probe requests disabled or obfuscated, so do check before you give up.

  2. Once you have your device, make sure the Wi-Fi is turned on.

  3. Then set up your monitoring interface as we have done many times before:

  4. The next thing to be done is to look for probe requests with tshark via the following command:

    tshark -n -i mon0 subtype probereq
    

    The screenshot of the following command is as follows:

  5. Your output at this point is a little rough, as the default output from tshark is not designed to be readable, just to have as much information in it as possible. It should look like the following:

  6. You can clearly see the MAC address and SSID of the probe request...