The probability and success factor of every attack depends on information gained through passive and active scanning of the network. Footprinting and reconnaissance are synonyms for the term information gathering.
The following diagram depicts the virtual/physical infrastructure we will be using for our analysis and for replicating the attacks:
The access point is located at 192.168.1.1 and it allocates the IP address to connected devices using DHCP; the attacking box (Kali) is configured with a manual IP address 192.168.1.106.