Penetration Testing with Kali Linux – Netdiscover for Wardriving
Any Penetration Testing project is heavily dependent on its first phase i.e.INFORMATION Gathering . Even during the war driving phase we need to discover the Addresses of the live hosts . In a case where your penetration testing requires you to scan for the wireless network addresses without connected to the network ,Netdiscover is of assistance .
Netdiscover 0.3-beta6 [Active/passive arp reconnaissance tool] Written by: Jaime Penalba <email@example.com> Usage: netdiscover [-i device] [-r range | -p] [-s time] [-n node] [-c count] [-f] [-S] -i device: your network device -r range: scan a given range instead of auto scan. 192.168.6.0/24,/16,/8 -p passive mode do not send anything, only sniff -s time: time to sleep between each arp request (miliseconds) -c count: number of times to send each arp reques (for nets with packet loss) -n node: last ip octet used for scanning (from 2 to 253) -S enable sleep time supression betwen each request (hardcore mode) -f enable fastmode scan, saves a lot of time, recommended for auto If -p or -r aren't enabled, netdiscover will scan for common lan addresses
Syntax : netdiscover
netdiscover -I eth0 -r 192.168.100.0/24