Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. 156 Security Essentials Lab Manual Name ________________________________________________________________ Date ________________________ Class ________________ Lab 14-3 Analyzing Wireless Activity Packets In Lab 14-1, you reviewed wireless networks and their proximity to your location as a hacker might attempt. In this activity, you will perform deeper analysis on the wireless activity in your location, including analyzing wireless network connections via IP and MAC addresses utilization, channels and beacons and encryption. This information can provide details on wireless usage, including connections from unknown hosts and rogue access points. This activity uses Wireshark and the evaluation version of CommView for WiFi. Be sure these are downloaded and installed before beginning. Learning Goals • View wireless devices. • Analyze wireless packets and detailed transmission data. • Review statistical information. Materials • Internet access • Web browser • Wireless network adapter • Wireless network access • TamoSoft CommView for WiFi (evaluation version) • Wireshark Procedures 1. Launch CommView for Wi-Fi on a machine that has Wi-Fi access. You may be prompted to install drivers for the wireless adapter to run in promiscuous-monitoring mode. When CommView for Wi-Fi is running, the wireless adapter will not be able to connect to or communicate with other wireless hosts. Once the program is closed, this functionality returns. 2. Review the main interface. Click the Nodes tab. Once packet capturing begins, you will be able to evaluate the wireless spectrum.