Academia.eduAcademia.edu

Table 4. Created scenarios for attack tests.  It was used in Windows and Kali operating systems during the attacks on scenarios. Kali operating system has been preferred for the use of the tool (Aircrack, Bully, coWPAtty, Fluxion, Fern, Wifite, MDK3) for attacks on wireless domains [10]. In order to see the effects on the end-user size, some attacks were made in the Windows 10 operating system. External USB wifi adapter is used to scan and explore wireless networks on computers.

Table 4 Created scenarios for attack tests. It was used in Windows and Kali operating systems during the attacks on scenarios. Kali operating system has been preferred for the use of the tool (Aircrack, Bully, coWPAtty, Fluxion, Fern, Wifite, MDK3) for attacks on wireless domains [10]. In order to see the effects on the end-user size, some attacks were made in the Windows 10 operating system. External USB wifi adapter is used to scan and explore wireless networks on computers.