580 California St., Suite 400
San Francisco, CA, 94104
Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Table 4 Created scenarios for attack tests. It was used in Windows and Kali operating systems during the attacks on scenarios. Kali operating system has been preferred for the use of the tool (Aircrack, Bully, coWPAtty, Fluxion, Fern, Wifite, MDK3) for attacks on wireless domains [10]. In order to see the effects on the end-user size, some attacks were made in the Windows 10 operating system. External USB wifi adapter is used to scan and explore wireless networks on computers.
Discover breakthrough research and expand your academic network
Join for free