p1

png

School

Portland Community College *

*We aren’t endorsed by this school

Course

285E

Subject

Information Systems

Date

Nov 24, 2024

Type

png

Pages

1

Uploaded by JudgeBoulder5277

Report
Auditing a Wireless Network and Planning for a Secure WLAN Implementation Hacker Techniques, Tools, and Incident Handling, Third Edition - Lab 08 Section 1: Hands-On Demonstration Note: In this section of the lab, you will follow a step-by-step walk-through of the objectives for this lab to produce the expected deliverable(s). 1. On your local computer, create the Lab Report file. Frequently performed tasks, such as how to create the Lab Report file, make screen captures, and download files from the lab, are explained in the Common Lab Tasks document. You should review these tasks before starting the lab. 2. Proceed with Part 1. Part 1: Explore the Aircrack-ng Suite Note: In the next steps, you will establish a remote connection to the Kali virtual machine and then explore the online manual for each of the hacking application tools included in the Aircrack-ng suite of tools. You will familiarize yourself with the available switches for each. Please note that wireless traffic cannot be effectively virtualized in this lab environment. Although you will explore several tools used for capturing and manipulating wireless traffic, you will not be able to use them without a WLAN interface.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help