<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>WiFi on MrAzoth</title>
    <link>https://az0th.it/wifi/</link>
    <description>Recent content in WiFi on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 24 Feb 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://az0th.it/wifi/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Wi-Fi Penetration Testing Guide</title>
      <link>https://az0th.it/wifi/wifi-pentest-guide/</link>
      <pubDate>Tue, 24 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/wifi/wifi-pentest-guide/</guid>
      <description>&lt;h1 id=&#34;wi-fi-penetration-testing-guide&#34;&gt;Wi-Fi Penetration Testing Guide&lt;/h1&gt;
&lt;h3 id=&#34;from-passive-analysis-to-enterprise-level-attacks&#34;&gt;From Passive Analysis to Enterprise-Level Attacks&lt;/h3&gt;
&lt;hr&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Legal Disclaimer:&lt;/strong&gt; This guide is published for educational purposes and authorized security assessments only. Performing attacks on networks without explicit written authorization is illegal in most jurisdictions. Use these techniques exclusively on networks you own or in controlled lab environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id=&#34;table-of-contents&#34;&gt;Table of Contents&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&#34;#1-80211-fundamentals&#34;&gt;802.11 Fundamentals&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#2-hardware--setup&#34;&gt;Hardware &amp;amp; Setup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#3-monitor-mode--preparation&#34;&gt;Monitor Mode &amp;amp; Preparation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#4-reconnaissance&#34;&gt;Reconnaissance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#5-cipher--traffic-analysis&#34;&gt;Cipher &amp;amp; Traffic Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#6-open-networks-opn--owe&#34;&gt;Open Networks (OPN) &amp;amp; OWE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#7-wep--legacy-protocol&#34;&gt;WEP — Legacy Protocol&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#8-wpa2-psk&#34;&gt;WPA2-PSK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#9-wpa3-sae--dragonblood&#34;&gt;WPA3-SAE &amp;amp; Dragonblood&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#10-evil-twin--evil-portal-attacks&#34;&gt;Evil Twin &amp;amp; Evil Portal Attacks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#11-wpa23-enterprise-mgt--reconnaissance&#34;&gt;WPA2/3-Enterprise (MGT) — Reconnaissance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#12-wpa23-enterprise-mgt--attacks&#34;&gt;WPA2/3-Enterprise (MGT) — Attacks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#13-advanced-enterprise-attacks&#34;&gt;Advanced Enterprise Attacks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#14-post-exploitation&#34;&gt;Post-Exploitation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#15-detection--defense-wids&#34;&gt;Detection &amp;amp; Defense (WIDS)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#16-tool-reference&#34;&gt;Tool Reference&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;hr&gt;
&lt;h2 id=&#34;1-80211-fundamentals&#34;&gt;1. 802.11 Fundamentals&lt;/h2&gt;
&lt;h3 id=&#34;11-the-ieee-80211-standard&#34;&gt;1.1 The IEEE 802.11 Standard&lt;/h3&gt;
&lt;p&gt;IEEE 802.11 is the family of standards governing wireless local area network (WLAN) communications. Transmission occurs over radio frequencies, primarily on:&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
