Skip to main content
. 2023 Jun 30;23(13):6067. doi: 10.3390/s23136067
Pseudocode 1: Pseudocode of the vulnerable scanner and the attack process
//Starting the vulnerable scanner on the victim machine
Start
   Launch web_browser
   //In the scanning loop
   Loop
      Scan Wi-Fi_networks
      If attacker_network_scanned
          //Display results and execute code
          Display Results (attacker_network & other_networks)
          Execute Code
      Else
          Display Results (other_networks)
      Endif
      //Check if the scanner is running
      If victim_stopped_the_scanner
          Break
      Endif
   Endloop
End