Setting up a wireless connection
By running Kali Linux as a virtual machine, you cannot use the wireless card that is embedded in your host OS. Fortunately, you can use an external USB-based wireless card.
For this demonstration, we are using the USB Ralink wireless card/external antenna (there will be an in-depth discussion of wireless antenna selection later on in the section concerning wireless penetration testing):
- To activate your USB-based wireless card in the Kali virtual machine, plug in the wireless card to a USB port, navigate to Devices | USB Devices, and select your wireless card from the VirtualBox menu:
In this screenshot, we can see the USB device listed.
- If your USB wireless card has been successfully recognized by Kali, you can use the dmesg program to see the wireless card's information. Another option to determine whether your wireless device is properly connected is to open a Terminal and run this command:
ifconfig
If the wireless connection is properly configured, you should see a listing under the output with WLAN0 or WLAN1 listed:
- The output should include a listing for a WLAN. This is the wireless network connection.
- In the top-right section of the Kali menu, you will see the Network Connections icon. You can click on it to display your network information.
- You will see several networks' names, wired or wireless, available for your machine:

- To connect to the wireless network, just select the particular SSID you want by double-clicking on its name. If the wireless network requires authentication, you will be prompted to enter the password. Only after you give the correct password will you be allowed to connect to that wireless network.
推薦閱讀
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- INSTANT Netcat Starter
- INSTANT Metasploit Starter
- 工業(yè)物聯(lián)網(wǎng)安全
- 網(wǎng)絡(luò)運(yùn)維親歷記 (網(wǎng)絡(luò)運(yùn)維紀(jì)實(shí)文學(xué))
- 云原生安全技術(shù)實(shí)踐指南
- 學(xué)電腦安全與病毒防范
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- CTF那些事兒
- INSTANT Apple Configurator How-to
- 白話零信任
- 捍衛(wèi)隱私
- 復(fù)雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- 互聯(lián)網(wǎng)域名國(guó)際化與安全技術(shù)導(dǎo)論