官术网_书友最值得收藏!

Summary

In this chapter, we introduced wireless penetration testing and provided a brief description of the four main phases in which it is pided: planning, discovery, attack, and reporting.

In the next chapter, we will see how to install Kali Linux on your computer and we will examine the requisites that your wireless adapter must meet to get started with wireless penetration testing.

主站蜘蛛池模板: 侯马市| 将乐县| 天门市| 新安县| 汨罗市| 忻城县| 许昌县| 葫芦岛市| 柳林县| 碌曲县| 土默特右旗| 大邑县| 木里| 上虞市| 光泽县| 辽源市| 广南县| 乌恰县| 蓬安县| 塘沽区| 修武县| 苍溪县| 尤溪县| 农安县| 巴楚县| 炉霍县| 沙河市| 阿鲁科尔沁旗| 永胜县| 伊宁市| 兴和县| 黑龙江省| 穆棱市| 湖州市| 瑞昌市| 延津县| 南岸区| 黔西县| 华宁县| 梓潼县| 德州市|