Summary

As we have seen, Wi-Fi networks, while making life easier for end users, have increased our security risks correspondingly. The investigation of Wi-Fi data also involves a number of additional complexities such as ensuring the wireless network interface is in the monitor mode. However, once these issues are taken care of, capturing and analyzing Wi-Fi data can be quite straightforward and is just a matter of applying tools in an effective manner.

So far, we have made pretty good progress. In the next chapter, we will put together all that we have studied to track an intruder in our network. Therefore, put on your 007 hats and let's get started…

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.183.210