官术网_书友最值得收藏!

Summary

Make sure you do a little prework upfront before starting your wireless penetration testing as it will save you a significant amount of frustration later on. In this chapter, we discussed the hardware and software that will be required to successfully conduct a wireless penetration test. Choosing the right wireless adapter is critical as not all of the required features are supported in all devices. As you work through the various scenarios presented to you during your test, it may be necessary to utilize different external antennas connected to your wireless adapter, and each of these was discussed in turn. From a software perspective, Kali Linux provides an excellent framework on which to build your wireless testing toolset. Driver support is solid and many security assessment tools are already preconfigured and tested using this distribution. Lastly, once the hardware and software are configured, you'll want to validate the capabilities of your wireless adapter to ensure it is fully supported by the operating system.

With these steps completed, you are ready to proceed to the remaining chapters in the book to identify, exploit, sniff, and manipulate the target wireless networks.

主站蜘蛛池模板: 永吉县| 万年县| 延安市| 饶河县| 客服| 务川| 太仆寺旗| 河源市| 眉山市| 古蔺县| 仙游县| 报价| 渝中区| 东城区| 古交市| 漳州市| 潞西市| 丹凤县| 长治市| 庆云县| 皋兰县| 灵宝市| 庆安县| 双峰县| 曲水县| 四平市| 凤翔县| 安泽县| 武清区| 东兰县| 汪清县| 静安区| 张家川| 达日县| 绥江县| 阿坝县| 丰顺县| 开鲁县| 卫辉市| 宣武区| 江都市|