官术网_书友最值得收藏!

Summary

In this chapter, we introduced wireless penetration testing and provided a brief description of the four main phases in which it is pided: planning, discovery, attack, and reporting.

In the next chapter, we will see how to install Kali Linux on your computer and we will examine the requisites that your wireless adapter must meet to get started with wireless penetration testing.

主站蜘蛛池模板: 佛教| 镇平县| 新干县| 陇川县| 乾安县| 丹阳市| 偏关县| 福州市| 连山| 乌什县| 马鞍山市| 阳东县| 铁岭县| 金平| 弥渡县| 容城县| 江城| 砚山县| 襄垣县| 安康市| 嵊泗县| 黎川县| 哈密市| 临城县| 新建县| 昌平区| 新疆| 柘城县| 营山县| 阿城市| 濮阳县| 新昌县| 崇信县| 拜泉县| 天镇县| 天镇县| 桂平市| 福清市| 沂源县| 辽源市| 沁水县|