官术网_书友最值得收藏!

Summary

In this chapter, we learned what a network is and how it works, and also studied basic network terminology and how to connect the wireless adapter to the virtual Kali machine. Mostly, we will only need this adapter for network penetration testing, to crack passwords. We also saw the important concept of MAC addresses, which are unique for every machine. Also, we saw how we can alter our MAC address so that we cannot be traced when hacking. Finally, we learned how we can enable monitor mode by using three different techniques.

In the next chapter, we will learn how to perform network penetration testing. 

主站蜘蛛池模板: 巴林左旗| 和政县| 聂荣县| 方城县| 娱乐| 宁蒗| 沙湾县| 时尚| 清苑县| 潜江市| 宁陵县| 静乐县| 乌兰察布市| 绥芬河市| 伊通| 库车县| 山丹县| 高青县| 瓦房店市| 通渭县| 周至县| 南华县| 九江市| 板桥市| 甘洛县| 赣州市| 镇坪县| 伊金霍洛旗| 西安市| 井研县| 平阳县| 安乡县| 根河市| 米易县| 沁源县| 绥宁县| 刚察县| 大城县| 信阳市| 仙桃市| 夏邑县|