You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Not all attacks are digital. Wireless attacks target the radio-frequency layer, while social engineering exploits human psychology. Both are powerful attack vectors and are commonly included in comprehensive penetration testing engagements — always with explicit authorisation.
Legal note: Intercepting wireless communications and conducting social engineering attacks without authorisation is illegal. These techniques require specific scope approval in the rules of engagement.
| Standard | Security Level | Status | Key Features |
|---|---|---|---|
| WEP | Very weak | Deprecated | Static keys, easily cracked |
| WPA | Weak | Deprecated | TKIP, still vulnerable |
| WPA2 | Moderate | Still common | AES/CCMP, vulnerable to KRACK |
| WPA3 | Strong | Current standard | SAE handshake, forward secrecy |
# Check if your adapter supports monitor mode
iwconfig
airmon-ng
# Enable monitor mode
sudo airmon-ng start wlan0
# Verify monitor mode
iwconfig wlan0mon
# Scan for nearby networks
sudo airodump-ng wlan0mon
# Target a specific network (capture handshake)
sudo airodump-ng -c 6 --bssid AA:BB:CC:DD:EE:FF -w capture wlan0mon
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.