. . . . . . . . . . "1103200161"^^ . . . "5325"^^ . "Monitor Mode"@de . . . . . . "\u064A\u0633\u0645\u062D \u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u060C \u0623\u0648 \u0648\u0636\u0639 RFMON (\u0645\u0631\u0627\u0642\u0628 \u062A\u0631\u062F\u062F \u0627\u0644\u0631\u0627\u062F\u064A\u0648) \u060C \u0644\u062C\u0647\u0627\u0632 \u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0645\u0632\u0648\u062F \u0628\u0648\u062D\u062F\u0629 \u062A\u062D\u0643\u0645 \u0641\u064A \u0648\u0627\u062C\u0647\u0629 \u0627\u0644\u0634\u0628\u0643\u0629 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064A\u0629 (WNIC) \u0628\u0645\u0631\u0627\u0642\u0628\u0629 \u0643\u0644 \u062D\u0631\u0643\u0629 \u0627\u0644\u0645\u0631\u0648\u0631 \u0627\u0644\u0648\u0627\u0631\u062F\u0629 \u0639\u0644\u0649 \u0642\u0646\u0627\u0629 \u0644\u0627\u0633\u0644\u0643\u064A\u0629. \u0628\u062E\u0644\u0627\u0641 \u0627\u0644\u0648\u0636\u0639 \u0627\u0644\u0645\u062E\u062A\u0644\u0637 (\u0627\u0644\u0648\u0636\u0639 \u0627\u0644\u0639\u0627\u062F\u064A) \u060C \u0648\u0627\u0644\u0630\u064A \u064A\u0633\u062A\u062E\u062F\u0645 \u0623\u064A\u0636\u064B\u0627 \u0644\u0627\u0633\u062A\u0646\u0634\u0627\u0642 \u0627\u0644\u062D\u0632\u0645\u0629 \u060C \u064A\u0633\u0645\u062D \u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0628\u0627\u0644\u062A\u0642\u0627\u0637 \u0627\u0644\u062D\u0632\u0645 \u062F\u0648\u0646 \u0627\u0644\u062D\u0627\u062C\u0629 \u0625\u0644\u0649 \u0627\u0644\u0627\u0631\u062A\u0628\u0627\u0637 \u0628\u0646\u0642\u0637\u0629 \u0648\u0635\u0648\u0644(AP) \u0623\u0648 \u0634\u0628\u0643\u0629 \u0645\u062E\u0635\u0635\u0629 \u0623\u0648\u0644\u0627\u064B. \u064A\u0646\u0637\u0628\u0642 \u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0641\u0642\u0637 \u0639\u0644\u0649 \u0627\u0644\u0634\u0628\u0643\u0627\u062A \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064A\u0629\u060C \u0628\u064A\u0646\u0645\u0627 \u064A\u0645\u0643\u0646 \u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u0627\u0644\u0648\u0636\u0639 \u0627\u0644\u0645\u062E\u062A\u0644\u0637 \u0639\u0644\u0649 \u0627\u0644\u0634\u0628\u0643\u0627\u062A \u0627\u0644\u0633\u0644\u0643\u064A\u0629 \u0648\u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064A\u0629. \u064A\u0639\u062F \u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0623\u062D\u062F \u0627\u0644\u0623\u0648\u0636\u0627\u0639 \u0627\u0644\u062B\u0645\u0627\u0646\u064A\u0629 \u0627\u0644\u062A\u064A \u064A\u0645\u0643\u0646 \u0623\u0646 \u062A\u0639\u0645\u0644 \u0628\u0647\u0627 \u0628\u0637\u0627\u0642\u0627\u062A 802.11 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064A\u0629: \u0631\u0626\u064A\u0633\u064A (\u064A\u0639\u0645\u0644 \u0643\u0646\u0642\u0637\u0629 \u0648\u0635\u0648\u0644) \u060C \u0645\u064F\u062F\u0627\u0631 (\u0639\u0645\u064A\u0644\u060C \u064A\u064F\u0639\u0631\u0641 \u0623\u064A\u0636\u064B\u0627 \u0628\u0627\u0633\u0645 \u0627\u0644\u0645\u062D\u0637\u0629) \u060C Ad hoc \u060C Repeater \u060C Mesh \u060C Wi-Fi Direct \u060C TDLS \u0648 \u0648\u0635\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 ."@ar . "Modo Monitor, tamb\u00E9m chamado de Modo de Monitoramento ou modo RFMON, permite que um computador com uma placa com interface de rede wireless (WNIC) realize monitoramento de todo o tr\u00E1fego recebido da rede wireless. Diferente do modo prom\u00EDscuo, que tamb\u00E9m \u00E9 utilizado para sniffar pacote, o modo monitor permite que pacotes sejam capturados sem precisar de associa\u00E7\u00E3o com um Ponto de Acesso ou rede Ad-hoc primeiro. Modo monitor cabe apenas \u00E0s redes wireless, enquanto modo prom\u00EDscuo pode ser usado em redes cabeadas. Modo monitor \u00E9 um dos quatro modos que placas wireless 802.11 podem operar: Master ou Mestre (age como um Ponto de Acesso), Gerenciado (cliente, tamb\u00E9m conhecido como esta\u00E7\u00E3o), Ad-Hoc e Monitor."@pt . . . . . . . "\u76D1\u542C\u6A21\u5F0F"@zh . . . . "Modo Monitor"@pt . . . . . . . . "Le mode moniteur (aussi appel\u00E9 Radio Frequency Monitoring, RF Monitor, rfmon, RFMON, Air Monitor, Network Monitor, NetMon, ou encore surveillance RF) permet \u00E0 un ordinateur \u00E9quip\u00E9 d'une carte r\u00E9seau Wi-Fi d'\u00E9couter tout le trafic d'un r\u00E9seau sans fil. \u00C0 la diff\u00E9rence du mode promiscuous, qui est aussi utilis\u00E9 pour sniffer un r\u00E9seau, le mode moniteur permet aux paquets d'\u00EAtre captur\u00E9s sans avoir besoin de s'enregistrer sur un point d'acc\u00E8s (AP) ou r\u00E9seau ad hoc. Le mode moniteur n'existe que sur les r\u00E9seaux sans fil, tandis que le mode promiscuous peut \u00EAtre utilis\u00E9 \u00E0 la fois sur les r\u00E9seaux filaires et sans fil. Le mode moniteur est l'un des quatre modes dans lesquels une carte sans fil 802.11 peut fonctionner : \n* infrastructure (managed), pour le client/la station communiquant \u00E0 travers un point d'acc\u00E8s ; \n* ad hoc, point \u00E0 point ; \n* ma\u00EEtre (master), c'est-\u00E0-dire se comportant comme un point d'acc\u00E8s ; \n* moniteur (monitor)."@fr . "AirSnort FAQ: What is the difference between monitor and promiscuous mode?"@en . "\u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629"@ar . . . . . . . . . . "\u76D1\u542C\u6A21\u5F0F\uFF08monitor mode\uFF09\uFF0C\u6216 RFMON\uFF08Radio Frequency MONitor\uFF09\uFF0C\u662F\u6307\u65E0\u7EBF\u7F51\u5361\u53EF\u4EE5\u63A5\u6536\u6240\u6709\u7ECF\u8FC7\u5B83\u7684\u6570\u636E\u6D41\u7684\u5DE5\u4F5C\u65B9\u5F0F\uFF0C\u5BF9\u5E94\u4E8EIEEE 802.11\u7F51\u5361\u7684\u5176\u4ED6\u6A21\u5F0F\uFF0C\u8BF8\u5982Master\uFF08\u8DEF\u7531\u5668\uFF09\u3001Managed\uFF08\u666E\u901A\u6A21\u5F0F\u7684\u7F51\u5361\uFF09\u3001Ad-hoc\u7B49\u3002\u76D1\u542C\u6A21\u5F0F\u4E0D\u533A\u5206\u6240\u63A5\u6536\u6570\u636E\u5305\u7684\u76EE\u6807MAC\u5730\u5740\uFF0C\u8FD9\u70B9\u548C\u6DF7\u6742\u6A21\u5F0F\u7C7B\u4F3C\u3002\u7136\u800C\uFF0C\u548C\u6DF7\u6742\u6A21\u5F0F\u4E0D\u540C\u7684\u662F\uFF0C\u76D1\u542C\u6A21\u5F0F\u7684\u4E0D\u9700\u8981\u548C\u65E0\u7EBF\u63A5\u5165\u70B9\uFF08AP\uFF09\u6216Ad-hoc\u7F51\u7EDC\u5EFA\u7ACB\u8FDE\u63A5\u3002\u76D1\u542C\u6A21\u5F0F\u662F\u65E0\u7EBF\u7F51\u5361\u7279\u6709\u7684\u7279\u6B8A\u6A21\u5F0F\uFF0C\u800C\u6DF7\u6742\u6A21\u5F0F\u5E94\u7528\u4E8E\u6709\u7EBF\u7F51\u5361\u548C\u65E0\u7EBF\u7F51\u5361\u3002 \u76D1\u542C\u6A21\u5F0F\u901A\u5E38\u7528\u4E8E\u7F51\u7EDC\u53D1\u73B0\u3001\u6D41\u91CF\u76D1\u542C\u548C\u5206\u7EC4\u5206\u6790\u3002Linux\u3001Mac OS X\u3001Windows\u4EE5\u53CA\u5176\u4ED6Unix-like\u5E73\u53F0\u6709\u4F7F\u7528\u76D1\u542C\u6A21\u5F0F\u7684\u7F51\u7EDC\u53D1\u73B0\u3001\u6293\u5305\u5DE5\u5177\uFF0C\u5982\u3001Kismet\u3001Wireshark\u3001Aircrack-NG\u7B49\u3002"@zh . "Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received on a wireless channel. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point or ad hoc network first. Monitor mode only applies to wireless networks, while promiscuous mode can be used on both wired and wireless networks. Monitor mode is one of the eight modes that 802.11 wireless adapter can operate in: Master (acting as an access point), Managed (client, also known as station), Ad hoc, Repeater, Mesh, Wi-Fi Direct, TDLS and Monitor mode."@en . . . . . . . . . "Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received on a wireless channel. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point or ad hoc network first. Monitor mode only applies to wireless networks, while promiscuous mode can be used on both wired and wireless networks. Monitor mode is one of the eight modes that 802.11 wireless adapter can operate in: Master (acting as an access point), Managed (client, also known as station), Ad hoc, Repeater, Mesh, Wi-Fi Direct, TDLS and Monitor mode."@en . . . "--12-30"^^ . "Mode moniteur"@fr . . . . . . . . "Le mode moniteur (aussi appel\u00E9 Radio Frequency Monitoring, RF Monitor, rfmon, RFMON, Air Monitor, Network Monitor, NetMon, ou encore surveillance RF) permet \u00E0 un ordinateur \u00E9quip\u00E9 d'une carte r\u00E9seau Wi-Fi d'\u00E9couter tout le trafic d'un r\u00E9seau sans fil. \u00C0 la diff\u00E9rence du mode promiscuous, qui est aussi utilis\u00E9 pour sniffer un r\u00E9seau, le mode moniteur permet aux paquets d'\u00EAtre captur\u00E9s sans avoir besoin de s'enregistrer sur un point d'acc\u00E8s (AP) ou r\u00E9seau ad hoc. Le mode moniteur n'existe que sur les r\u00E9seaux sans fil, tandis que le mode promiscuous peut \u00EAtre utilis\u00E9 \u00E0 la fois sur les r\u00E9seaux filaires et sans fil."@fr . . "Modo Monitor, tamb\u00E9m chamado de Modo de Monitoramento ou modo RFMON, permite que um computador com uma placa com interface de rede wireless (WNIC) realize monitoramento de todo o tr\u00E1fego recebido da rede wireless. Diferente do modo prom\u00EDscuo, que tamb\u00E9m \u00E9 utilizado para sniffar pacote, o modo monitor permite que pacotes sejam capturados sem precisar de associa\u00E7\u00E3o com um Ponto de Acesso ou rede Ad-hoc primeiro. Modo monitor cabe apenas \u00E0s redes wireless, enquanto modo prom\u00EDscuo pode ser usado em redes cabeadas. Modo monitor \u00E9 um dos quatro modos que placas wireless 802.11 podem operar: Master ou Mestre (age como um Ponto de Acesso), Gerenciado (cliente, tamb\u00E9m conhecido como esta\u00E7\u00E3o), Ad-Hoc e Monitor."@pt . . . "Monitor Mode oder Monitormodus bezeichnet einen bestimmten Betriebsmodus eines Wireless Adapters, bei dem s\u00E4mtliche empfangenen Netzwerkframes an das Betriebssystem und die Anwendungen weitergeleitet werden. Im Monitor Mode werden im Gegensatz zum Promiscuous Mode alle empfangenen Frames weitergeleitet, nicht nur die des Netzwerks, mit dem der Client momentan verbunden ist. Ein Vorteil ist, dass kein einziges Frame von der eigenen Netzwerkkarte gesendet werden muss und daher das Abh\u00F6ren der Frames nicht in evtl. Protokolldateien erkennbar ist. Au\u00DFerdem ist keinerlei Authentifizierung am Netzwerk notwendig. Sind die Framepakete verschl\u00FCsselt, zum Beispiel mit WPA2, so k\u00F6nnen sie aufgezeichnet und sp\u00E4ter entschl\u00FCsselt werden. Dies ist mit WPA3 dank Perfect Forward Secrecy nicht mehr m\u00F6glich. Manche Netzwerkkarten-Treiber \u00FCberspringen im Monitor Mode die \u00DCberpr\u00FCfung der Pr\u00FCfsumme der Zyklischen Redundanzpr\u00FCfung (cyclic redundancy check) der Frames, was dazu f\u00FChrt, dass fehlerhafte Frames weitergeleitet werden k\u00F6nnen. Die Integrit\u00E4t der Daten ist also im Monitor Mode nicht sichergestellt. Dar\u00FCber hinaus bieten nicht alle Treiber die M\u00F6glichkeit, die Karte in den Monitor Mode zu versetzen, oder erlauben im Monitor Mode kein Senden von Paketen. Siehe auch: Promiscuous Mode"@de . . "Monitor Mode oder Monitormodus bezeichnet einen bestimmten Betriebsmodus eines Wireless Adapters, bei dem s\u00E4mtliche empfangenen Netzwerkframes an das Betriebssystem und die Anwendungen weitergeleitet werden. Manche Netzwerkkarten-Treiber \u00FCberspringen im Monitor Mode die \u00DCberpr\u00FCfung der Pr\u00FCfsumme der Zyklischen Redundanzpr\u00FCfung (cyclic redundancy check) der Frames, was dazu f\u00FChrt, dass fehlerhafte Frames weitergeleitet werden k\u00F6nnen. Die Integrit\u00E4t der Daten ist also im Monitor Mode nicht sichergestellt. Siehe auch: Promiscuous Mode"@de . "\u76D1\u542C\u6A21\u5F0F\uFF08monitor mode\uFF09\uFF0C\u6216 RFMON\uFF08Radio Frequency MONitor\uFF09\uFF0C\u662F\u6307\u65E0\u7EBF\u7F51\u5361\u53EF\u4EE5\u63A5\u6536\u6240\u6709\u7ECF\u8FC7\u5B83\u7684\u6570\u636E\u6D41\u7684\u5DE5\u4F5C\u65B9\u5F0F\uFF0C\u5BF9\u5E94\u4E8EIEEE 802.11\u7F51\u5361\u7684\u5176\u4ED6\u6A21\u5F0F\uFF0C\u8BF8\u5982Master\uFF08\u8DEF\u7531\u5668\uFF09\u3001Managed\uFF08\u666E\u901A\u6A21\u5F0F\u7684\u7F51\u5361\uFF09\u3001Ad-hoc\u7B49\u3002\u76D1\u542C\u6A21\u5F0F\u4E0D\u533A\u5206\u6240\u63A5\u6536\u6570\u636E\u5305\u7684\u76EE\u6807MAC\u5730\u5740\uFF0C\u8FD9\u70B9\u548C\u6DF7\u6742\u6A21\u5F0F\u7C7B\u4F3C\u3002\u7136\u800C\uFF0C\u548C\u6DF7\u6742\u6A21\u5F0F\u4E0D\u540C\u7684\u662F\uFF0C\u76D1\u542C\u6A21\u5F0F\u7684\u4E0D\u9700\u8981\u548C\u65E0\u7EBF\u63A5\u5165\u70B9\uFF08AP\uFF09\u6216Ad-hoc\u7F51\u7EDC\u5EFA\u7ACB\u8FDE\u63A5\u3002\u76D1\u542C\u6A21\u5F0F\u662F\u65E0\u7EBF\u7F51\u5361\u7279\u6709\u7684\u7279\u6B8A\u6A21\u5F0F\uFF0C\u800C\u6DF7\u6742\u6A21\u5F0F\u5E94\u7528\u4E8E\u6709\u7EBF\u7F51\u5361\u548C\u65E0\u7EBF\u7F51\u5361\u3002 \u76D1\u542C\u6A21\u5F0F\u901A\u5E38\u7528\u4E8E\u7F51\u7EDC\u53D1\u73B0\u3001\u6D41\u91CF\u76D1\u542C\u548C\u5206\u7EC4\u5206\u6790\u3002Linux\u3001Mac OS X\u3001Windows\u4EE5\u53CA\u5176\u4ED6Unix-like\u5E73\u53F0\u6709\u4F7F\u7528\u76D1\u542C\u6A21\u5F0F\u7684\u7F51\u7EDC\u53D1\u73B0\u3001\u6293\u5305\u5DE5\u5177\uFF0C\u5982\u3001Kismet\u3001Wireshark\u3001Aircrack-NG\u7B49\u3002"@zh . "3249942"^^ . "Monitor mode"@en . "\u064A\u0633\u0645\u062D \u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u060C \u0623\u0648 \u0648\u0636\u0639 RFMON (\u0645\u0631\u0627\u0642\u0628 \u062A\u0631\u062F\u062F \u0627\u0644\u0631\u0627\u062F\u064A\u0648) \u060C \u0644\u062C\u0647\u0627\u0632 \u0643\u0645\u0628\u064A\u0648\u062A\u0631 \u0645\u0632\u0648\u062F \u0628\u0648\u062D\u062F\u0629 \u062A\u062D\u0643\u0645 \u0641\u064A \u0648\u0627\u062C\u0647\u0629 \u0627\u0644\u0634\u0628\u0643\u0629 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064A\u0629 (WNIC) \u0628\u0645\u0631\u0627\u0642\u0628\u0629 \u0643\u0644 \u062D\u0631\u0643\u0629 \u0627\u0644\u0645\u0631\u0648\u0631 \u0627\u0644\u0648\u0627\u0631\u062F\u0629 \u0639\u0644\u0649 \u0642\u0646\u0627\u0629 \u0644\u0627\u0633\u0644\u0643\u064A\u0629. \u0628\u062E\u0644\u0627\u0641 \u0627\u0644\u0648\u0636\u0639 \u0627\u0644\u0645\u062E\u062A\u0644\u0637 (\u0627\u0644\u0648\u0636\u0639 \u0627\u0644\u0639\u0627\u062F\u064A) \u060C \u0648\u0627\u0644\u0630\u064A \u064A\u0633\u062A\u062E\u062F\u0645 \u0623\u064A\u0636\u064B\u0627 \u0644\u0627\u0633\u062A\u0646\u0634\u0627\u0642 \u0627\u0644\u062D\u0632\u0645\u0629 \u060C \u064A\u0633\u0645\u062D \u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0628\u0627\u0644\u062A\u0642\u0627\u0637 \u0627\u0644\u062D\u0632\u0645 \u062F\u0648\u0646 \u0627\u0644\u062D\u0627\u062C\u0629 \u0625\u0644\u0649 \u0627\u0644\u0627\u0631\u062A\u0628\u0627\u0637 \u0628\u0646\u0642\u0637\u0629 \u0648\u0635\u0648\u0644(AP) \u0623\u0648 \u0634\u0628\u0643\u0629 \u0645\u062E\u0635\u0635\u0629 \u0623\u0648\u0644\u0627\u064B. \u064A\u0646\u0637\u0628\u0642 \u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0641\u0642\u0637 \u0639\u0644\u0649 \u0627\u0644\u0634\u0628\u0643\u0627\u062A \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064A\u0629\u060C \u0628\u064A\u0646\u0645\u0627 \u064A\u0645\u0643\u0646 \u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u0627\u0644\u0648\u0636\u0639 \u0627\u0644\u0645\u062E\u062A\u0644\u0637 \u0639\u0644\u0649 \u0627\u0644\u0634\u0628\u0643\u0627\u062A \u0627\u0644\u0633\u0644\u0643\u064A\u0629 \u0648\u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064A\u0629. \u064A\u0639\u062F \u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0623\u062D\u062F \u0627\u0644\u0623\u0648\u0636\u0627\u0639 \u0627\u0644\u062B\u0645\u0627\u0646\u064A\u0629 \u0627\u0644\u062A\u064A \u064A\u0645\u0643\u0646 \u0623\u0646 \u062A\u0639\u0645\u0644 \u0628\u0647\u0627 \u0628\u0637\u0627\u0642\u0627\u062A 802.11 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064A\u0629: \u0631\u0626\u064A\u0633\u064A (\u064A\u0639\u0645\u0644 \u0643\u0646\u0642\u0637\u0629 \u0648\u0635\u0648\u0644) \u060C \u0645\u064F\u062F\u0627\u0631 (\u0639\u0645\u064A\u0644\u060C \u064A\u064F\u0639\u0631\u0641 \u0623\u064A\u0636\u064B\u0627 \u0628\u0627\u0633\u0645 \u0627\u0644\u0645\u062D\u0637\u0629) \u060C Ad hoc \u060C Repeater \u060C Mesh \u060C Wi-Fi Direct \u060C TDLS \u0648 \u0648\u0635\u0639 \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 ."@ar .