| Pseudocode 1: Pseudocode of the vulnerable scanner and the attack process |
| //Starting the vulnerable scanner on the victim machine |
| Start |
| Launch web_browser |
| //In the scanning loop |
| Loop |
| Scan Wi-Fi_networks |
| If attacker_network_scanned |
| //Display results and execute code |
| Display Results (attacker_network & other_networks) |
| Execute Code |
| Else |
| Display Results (other_networks) |
| Endif |
| //Check if the scanner is running |
| If victim_stopped_the_scanner |
| Break |
| Endif |
| Endloop |
| End |