# 2. Pre Connection Attacks

# I am assuming you already did this:

### [>>you need to prepare your network card like here<<](https://wiki.tinfoil-hat.net/books/wireless/page/1-monitor-mode-randomized-mac)

# Scan Networks
```
airodump-ng wlan0
```
You should see something like this:

[![Bildschirmfoto vom 2023-02-10 18-03-06.png](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/scaled-1680-/bildschirmfoto-vom-2023-02-10-18-03-06.png)](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/bildschirmfoto-vom-2023-02-10-18-03-06.png)

let's break this down:

### BSSID
Is the MAC Address of the Network
### PWR
Is the signal strenght or power. The higher the number, the better signal we have 
### Beacons
Are the frames send from the Network to broadcast it's existance. Every Network, even if it's hidden, sends this frames to tell the wireless devices that it exists and it's MAC Address, it's channel, it's encryption and it's name
### Data
This are the data packages or data frames. They are the packages which get interesting when it comes to wireless hacking
### #/s
Are the packages which were collected the last 10 seconds
### CH
Is the wireless Channel of the Network
### MB
Is the Maxinum Speed supported
### ENC
Is the Encryption used
### CIPHER
Cipher used in the Network
### Auth
is the authentications used in this network. For example PSK (Pre shared key) or MGT
## ESSID
Is the Network Name

Don't worry just jet about **ENC, CIPHER and Auth** just yet, it will be a part in the gaining Access part of this Wiki