

In addition, testers should acquire a strong background in wireless networking before they implement attacks or audit a wireless network. Kali Linux was released with several tools to facilitate the testing of wireless networks however, these attacks require extensive configuration to be fully effective.

Actively deauthenticating a client to force the client to associate and then capturing that association.Sniffing the wireless environment and waiting for a client to associate to a network and then capturing that association.Hiding the ESSID is a poor method of attempting to achieve security through obscurity unfortunately, the ESSID can be obtained by: ESSID(Extended Service Set Identifier) is the sequence of characters that uniquely identify a wireless local area network.
