

Real clients will send probe requests for configured networks, and these frames will allow us to bind clients to our Fake AP that we configured. The goal of this program is for clients to associate with the Fake AP, not the real access point.


Attacks : we can do replay attacks, deauthentication attacks, set up a fake access point for victims to connect to, and even inject packets into the wireless network.For example, we can capture all the WiFi network packets and analyze them with the WireShark program. Monitoring : this software allows you to capture all the packets of a wireless network, export the data to text files and also to other formats to be analyzed by other programs.This security suite focuses specifically on four distinct areas of cybersecurity in wireless networks: In order to make it easier for the user to use the different tools, depending on what we want to do with the wireless network, we will have to use one program or another. This software is a complete audit suite that is divided into different programs specifically designed for a specific task, we do not have a “big” program that performs different actions based on arguments. This suite is one of the most used to try to hack or crack WiFi networks with WEP, WPA and also WPA2 encryption on different computers. Aircrack-ng is a suite of programs that will allow us to perform WiFi wireless audits on WiFi routers and access points.
