What are Wi-Fi interfaces used for?
Transmitting and receiving wireless data.
Why is interface capability important in pentesting?
Weak interfaces may fail to capture data effectively.
Which IEEE standards should a pentesting card support?
802.11ac or 802.11ax.
Which two capabilities are essential for Wi-Fi pentesting interfaces?
Monitor mode and packet injection.
What utility checks Wi-Fi interface details in Linux?
iwconfig.
What does TxPower represent?
The transmission power level of the Wi-Fi interface.
How can you view regional power limits?
By running ‘iw reg get’.
What command sets the regulatory domain to the US?
sudo iw reg set US.
What command increases TxPower to 30 dBm?
sudo iwconfig wlan0 txpower 30.
Which command lists interface capabilities?
iw list.
What does ‘Supported interface modes’ show?
The operational modes (managed, monitor, AP, etc.) supported by the card.
Which command scans available Wi-Fi networks?
iwlist wlan0 scan.
How can you filter scan results for ESSID or Quality?
Use grep with ‘Cell|Quality|ESSID|IEEE’.
Which command lists available channels?
iwlist wlan0 channel.
How do you change a Wi-Fi interface’s channel?
ifconfig wlan0 down → iwconfig wlan0 channel X → ifconfig wlan0 up.
How do you set frequency directly instead of channel?
sudo iwconfig wlan0 freq ‘5.52G’.
What is Managed mode used for?
Connecting as a client to access points.
What is Ad-hoc mode?
Peer-to-peer networking between devices.
What tool manages Master mode (AP mode)?
hostapd.
What is Monitor mode used for?
Capturing all wireless packets regardless of destination.
How to enable Monitor mode?
Bring interface down → iw wlan0 set monitor control → bring interface up.
What’s the difference between Managed and Monitor mode?
Managed connects to APs; Monitor passively captures all traffic.
Why is Monitor mode critical in pentesting?
It allows sniffing and packet injection for attacks and analysis.
What’s an Evil Twin attack?
A rogue AP mimicking a legitimate one to intercept connections.