Auditing
a
Wireless
Network
and
Planning
for
a
Secure
WLAN
Implementation
Hacker
Techniques,
Tools,
and
Incident
Handling,
Third
Edition
-
Lab
08
Section
1:
Hands-On
Demonstration
Note:
In
this
section
of
the
lab,
you
will
follow
a
step-by-step
walk-through
of
the
objectives
for
this
lab
to
produce
the
expected
deliverable(s).
1.
On
your
local
computer,
create
the
Lab
Report
file.
Frequently
performed
tasks,
such
as
how
to
create
the
Lab
Report
file,
make
screen
captures,
and
download
files
from
the
lab,
are
explained
in
the
Common
Lab
Tasks
document.
You
should
review
these
tasks
before
starting
the
lab.
2.
Proceed
with
Part
1.
Part
1:
Explore
the
Aircrack-ng
Suite
Note:
In
the
next
steps,
you
will
establish
a
remote
connection
to
the
Kali
virtual
machine
and
then
explore
the
online
manual
for
each
of
the
hacking
application
tools
included
in
the
Aircrack-ng
suite
of
tools.
You
will
familiarize
yourself
with
the
available
switches
for
each.
Please
note
that
wireless
traffic
cannot
be
effectively virtualized
in
this
lab
environment.
Although
you
will
explore
several
tools
used
for
capturing
and
manipulating
wireless
traffic,
you
will
not
be
able
to
use
them
without
a
WLAN
interface.