官术网_书友最值得收藏!

Summary

Make sure you do a little prework upfront before starting your wireless penetration testing as it will save you a significant amount of frustration later on. In this chapter, we discussed the hardware and software that will be required to successfully conduct a wireless penetration test. Choosing the right wireless adapter is critical as not all of the required features are supported in all devices. As you work through the various scenarios presented to you during your test, it may be necessary to utilize different external antennas connected to your wireless adapter, and each of these was discussed in turn. From a software perspective, Kali Linux provides an excellent framework on which to build your wireless testing toolset. Driver support is solid and many security assessment tools are already preconfigured and tested using this distribution. Lastly, once the hardware and software are configured, you'll want to validate the capabilities of your wireless adapter to ensure it is fully supported by the operating system.

With these steps completed, you are ready to proceed to the remaining chapters in the book to identify, exploit, sniff, and manipulate the target wireless networks.

主站蜘蛛池模板: 嘉鱼县| 三门县| 璧山县| 福贡县| 方城县| 安徽省| 弥勒县| 万年县| 沙河市| 昭苏县| 织金县| 灵丘县| 广安市| 松原市| 凭祥市| 乳源| 新建县| 保山市| 连云港市| 淅川县| 新龙县| 平昌县| 中宁县| 新巴尔虎左旗| 兰西县| 泌阳县| 新田县| 加查县| 酒泉市| 阜平县| 泰来县| 建昌县| 湖南省| 洪江市| 霍林郭勒市| 启东市| 平江县| 云梦县| 莱州市| 普宁市| 桐城市|