Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. 149 Name ________________________________________________________________ Date ________________________ Class ________________ Lab 14-1 Wireless Network Scanning Security administrators need to identify wireless networks accessible within their organization. There are many tools available for locating networks and their settings. inSSIDer is a popular tool for scanning Wi-Fi networks and will be utilized in this activity. Ensure it is downloaded and installed before beginning this activity. The free version can be downloaded and installed from the website www.metageek.com. When completing this activity, do not connect or attempt to connect to any network! Observe all laws and safety regulations, and strictly adhere to your institution’s code of ethics. Learning Goals Conduct network scanning. Identify open Wi-Fi networks. Analyze open Wi-Fi networks. Materials Mobile device or laptop Windows 10 inSSIDer Procedures 1. Review the physical features of your workspace, as assigned by your instructor. In the space provided, make notes of the physical location, date, time, and types of materials you see (e.g., steel, concrete, etc.). _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 2. Open inSSIDer. Scroll through the list of the networks. 3. List the unique channels you see in the space provided, and note whether they are 2.4 GHz or 5 GHz. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ Wireless Network Security CHAPTER 14
Previous Page Next Page