官术网_书友最值得收藏!

Summary

In this chapter, we have seen how to create a virtual machine using Virtual Box and how to install Kali Linux on it. After covering the wireless adapter's requirements for wireless penetration testing, we have configured the USB wireless adapter to work with Kali Linux and tested it for the requirements that we analyzed earlier.

In the next chapter, we are going to cover the wireless penetration testing's discovery and information gathering phase.

主站蜘蛛池模板: 武冈市| 卢氏县| 汶上县| 徐汇区| 安乡县| 文山县| 南宫市| 林甸县| 长泰县| 嘉鱼县| 嘉祥县| 元阳县| 彰化县| 新绛县| 盱眙县| 永州市| 金阳县| 南溪县| 宣恩县| 安丘市| 武乡县| 乌兰县| 太康县| 常熟市| 铁岭市| 荃湾区| 新乡县| 鹤岗市| 永清县| 安西县| 惠来县| 黄山市| 普洱| 四会市| 馆陶县| 石阡县| 镶黄旗| 万年县| 新野县| 师宗县| 灵丘县|