官术网_书友最值得收藏!

Summary

In this chapter, we have seen how to create a virtual machine using Virtual Box and how to install Kali Linux on it. After covering the wireless adapter's requirements for wireless penetration testing, we have configured the USB wireless adapter to work with Kali Linux and tested it for the requirements that we analyzed earlier.

In the next chapter, we are going to cover the wireless penetration testing's discovery and information gathering phase.

主站蜘蛛池模板: 广昌县| 嵩明县| 台南市| 闵行区| 白朗县| 汝城县| 凯里市| 霍州市| 勐海县| 凤阳县| 临汾市| 南江县| 嘉善县| 兴安盟| 南雄市| 沈阳市| 梁河县| 临沭县| 古浪县| 泰和县| 东阿县| 双流县| 山东省| 巫山县| 新巴尔虎右旗| 永春县| 石家庄市| 重庆市| 台北市| 溧水县| 石狮市| 东乡县| 吴忠市| 米泉市| 饶河县| 桃园县| 思茅市| 香河县| 稷山县| 固安县| 肃宁县|