- Kali Linux Wireless Penetration Testing Cookbook
- Sean Philip Oriyano
- 88字
- 2021-07-02 22:05:52
Getting ready
Something to be aware of if you choose to virtualize Kali and use it for wireless network testing is that you will need to configure your virtual environment to work with an external adapter on the host system. In most cases, you will need to use an external USB wireless adapter and find out how to configure your virtualization software to use a technique commonly known as USB Passthrough. Since this is unique to a virtualization software package, we will not be covering this process here.
推薦閱讀
- 網(wǎng)絡(luò)安全與管理
- 數(shù)據(jù)恢復(fù)方法及案例分析
- Practical Network Scanning
- 數(shù)據(jù)安全實踐指南
- API攻防:Web API安全指南
- 硬黑客:智能硬件生死之戰(zhàn)
- 軟件安全保障體系架構(gòu)
- Mastering Reverse Engineering
- 黑客攻防從入門到精通
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 華為Anti-DDoS技術(shù)漫談
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- 聯(lián)邦學(xué)習(xí)原理與算法
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- Python Penetration Testing Essentials