官术网_书友最值得收藏!

Summary

In this chapter, we have seen how to create a virtual machine using Virtual Box and how to install Kali Linux on it. After covering the wireless adapter's requirements for wireless penetration testing, we have configured the USB wireless adapter to work with Kali Linux and tested it for the requirements that we analyzed earlier.

In the next chapter, we are going to cover the wireless penetration testing's discovery and information gathering phase.

主站蜘蛛池模板: 胶南市| 江孜县| 永胜县| 万山特区| 岳西县| 朔州市| 谢通门县| 邛崃市| 苍梧县| 上虞市| 类乌齐县| 宣威市| 建昌县| 青神县| 星子县| 金沙县| 依安县| 江永县| 从江县| 娄底市| 罗江县| 琼结县| 黎川县| 临澧县| 久治县| 鸡泽县| 睢宁县| 通化县| 沭阳县| 衡山县| 靖安县| 独山县| 玉门市| 基隆市| 封丘县| 双牌县| 当涂县| 抚顺市| 鄂托克前旗| 平遥县| 巴塘县|