If there are multiple beacons present, a client will choose which of the available Basic Service Sets it can join.Windows XP users will even be presented with a list of SSIDs representing the networks that they can connect to at their behest.
Probe request management frames can also be transmitted by the client at any access point as well to ensure uninterrupted connection.
Once the command-line programs are executed and the WEP or WPA encryption process starts, the attacker can commence his own operation by using a sniffer program to find wireless gadgets running in peer mode.
From there, he'll probably deploy a key logger or a precisely placed Trojan horse that will allow him to cripple your network system to the point where he has complete control over it, exploiting each and every last inherent weakness that's been outlined thus far.
In fact, as long as an unsuspecting user is surfing via an exposed and public "Free WiFi" area, a cyber attacker can pretty much do anything he wants and use all sorts of methods to begin his invasion.
Clients can be found on both wired and wireless networks.
A client could either be a server, a printer, or even a NAS (Network Attached Storage) device.
Usually, makeshift networks that had been setup from out of the blue without any prior planning whatsoever lack any printers or servers; the only thing present in these ad-hoc installations are other people's machines, because a network of computers is the easiest type of network to establish. A client can also be used by crackers to run amok on any given notebook PC or PDA using wireless technology.
For instance, because the majority of users have no idea how to protect their machines from the ravages of cyberspace and since most propriety operating systems being used in personal computers nowadays are Microsoft-based (which means they're susceptible to hacker attacks), dedicated and competent crackers have plenty of wiggle room to use when it comes to doing what they do best.
The combined factors of the notoriously threat-prone Windows 10 operating system and the general ignorance of the everyday, average user when it comes to cyber security allows hackers quite a lot of leeway to pretty much do whatever they want to a WiFi client.
Moreover, a laptop that uses a wireless connection is one of the most exposed and hacker-vulnerable setups in existence.
To be more exact, an office notebook or any other mobile device that is linked to the Ethernet can still have its Wireless Network Interface Card installed and configured in peer mode although the office from which it came from has not submitted a WiFi network, thus leaving it exposed to hacker attacks by default.
Ergo, NetStumbler or any other wireless sniffer program can then be utilized in order to locate wireless devices configured in peer mode.