Wi-Fi

Wi-Fi at 2.4/5/6 GHz connects nearly everything. This page gives a concise field guide: signal basics, common research workflows (in a lab), defenses, FAQs, and devices that excel at Wi-Fi testing.

Quick-start checklist

  1. Permission & scope: Only test networks you own or have explicit written authorization to assess.
  2. Define goals: Recon only? Lab capture of handshakes? Evil Twin UX testing? Keep it scoped and safe.
  3. Pick band & channels: 2.4 GHz (crowded, long range), 5 GHz (cleaner), 6 GHz (Wi-Fi 6E; reduced legacy noise).
  4. Tooling ready: One recon/sniffer radio + (optionally) a second for AP/attack simulations in a lab.
  5. Keep logs: Timestamp captures, channel plan, clients seen, AP capabilities; screenshot interesting frames.

Wi-Fi primer (bands, frames, auth)

Wi-Fi is IEEE 802.11. Devices exchange management frames (beacons, probe req/resp, auth/assoc), control frames (RTS/CTS/ACK), and data frames (payload). Security layers (WPA2/WPA3) live above association.

Bands & channels: 2.4 GHz (1–14), 5 GHz (36–165), 6 GHz (low/high 6E ranges). Channel width affects throughput and interference—don’t over-bond in noisy environments.
Client AP Probe → Auth → Assoc → (WPA) 4-Way Handshake
Association precedes encryption; the 4-way handshake derives session keys for WPA2/WPA3-SAE.

Common research workflows

1) Recon & channel planning (passive)

2) Handshake capture (lab)

3) Evil Twin / captive portal UX testing (lab)

4) PMKID capture (WPA2-PSK, lab)

5) 6 GHz & WPA3-SAE behavior

Ethics: Deauth, Evil Twin, and credential harvesting must be performed in a controlled lab or explicit engagement scope. Do not touch networks you don’t own or control.

WPA2/WPA3 lab notes

Blue-team & hardening

Troubleshooting

FAQ

Is deauth illegal?

Unauthorized interference is illegal in many jurisdictions. Only perform deauth in a controlled lab or authorized engagement with written permission.

Do I need special adapters?

For monitor/injection you need chipsets/firmware that support it. Many testers keep a known-good 2.4/5 GHz adapter and a separate 6E-capable one.

Is WPA3 unbreakable?

WPA3 improves resilience but misconfigurations and weak passwords still create risk. Defense-in-depth beats any single control.

Devices for Wi-Fi

Useful references

Legal & ethics: See Ethics for permission boundaries and safe lab practices.