官术网_书友最值得收藏!

Summary

In this chapter, we learned what a network is and how it works, and also studied basic network terminology and how to connect the wireless adapter to the virtual Kali machine. Mostly, we will only need this adapter for network penetration testing, to crack passwords. We also saw the important concept of MAC addresses, which are unique for every machine. Also, we saw how we can alter our MAC address so that we cannot be traced when hacking. Finally, we learned how we can enable monitor mode by using three different techniques.

In the next chapter, we will learn how to perform network penetration testing. 

主站蜘蛛池模板: 富顺县| 望江县| 玛多县| 卢龙县| 合江县| 手机| 剑阁县| 曲沃县| 荔波县| 中江县| 宁蒗| 垣曲县| 外汇| 岢岚县| 阿图什市| 安乡县| 平顶山市| 通城县| 泽州县| 久治县| 建平县| 汉中市| 吉首市| 德阳市| 罗甸县| 定襄县| 淮安市| 沙雅县| 如东县| 广东省| 尉氏县| 神农架林区| 图木舒克市| 白河县| 浏阳市| 潍坊市| 绥化市| 永修县| 平山县| 台中县| 枞阳县|