Pseudocode 1: Pseudocode of the vulnerable scanner and the attack process |
//Starting the vulnerable scanner on the victim machine |
Start |
Launch web_browser |
//In the scanning loop |
Loop |
Scan Wi-Fi_networks |
If attacker_network_scanned |
//Display results and execute code |
Display Results (attacker_network & other_networks) |
Execute Code |
Else |
Display Results (other_networks) |
Endif |
//Check if the scanner is running |
If victim_stopped_the_scanner |
Break |
Endif |
Endloop |
End |