![]() ![]() More awesome, perhaps, is the tool's ability to actually perform traffic sniffing and capture packets. $ airport en1 scan SSID BSSID RSSI CHANNEL HT CC SECURITY (auth/unicast/group) moscohome 00:22:6b:8b:86:51 -61 10 N - WPA2(PSK/AES/AES) PUBLIC-455H 00:15:6d:60:95:d1 -82 1 N - NONE Alex Network 00:1e:e5:24:c4:4f -86 1 Y TW WPA(PSK/TKIP,AES/TKIP) WPA2(PSK/TKIP,AES/TKIP) linksysELNIDO 00:21:29:a3:fd:99 -90 6 N - WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP) 2WIRE024 00:18:3f:02:2f:49 -88 6 N US WEP 2WIRE940 00:12:88:d9:85:41 -93 6 N US WEPIf I wanted to see which of my neighbors still haven't upgraded from WEP, I could just filter using grep: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |