Originally Posted by
j283lwwme2
Especially since this is being used as a LiveCD, it seems counter productive to announce one's presence on the network when doing pen testing.
I respectfully want to disagree with this statement. By it's nature pen testing can be quite destructive. Why one reason you would want to schedule an attack on a production environment, when traffic is low and downtime will be the least disruptive. For many vectors, there really is no way to hide the fact that the host machine is being (or attempting to be) compromised. With that being said however, for example a man-in-the-middle attack, then yes, you wouldn't want to have your presence know. But that is not really a factor of pen testing, as (it is) being closer to social engineering.
Now for your original post, wireshark will see many things from kali if you are running wireshark from with in kali. But as long as you are using monitor mode then the likely hood of the 'network' from knowing you are trying to figure anything out about the systems security should be null.
Fact, Science and the Pursuit of Knowledge. Working to secure your networks from threats; Outside and Within.