-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Ultimate Kali Linux Book
By :

As an aspiring ethical hacking and penetration tester, you may be assigned to perform wireless penetration testing techniques on a targeted network with the intent of identifying any security vulnerabilities and assessing the attack surface to better understand how an adversary may be able to compromise the wireless network of an organization and gain unauthorized access.
While many ethical hackers and penetration testers prefer to directly install Kali Linux on the local storage drive on their laptops to improve mobility and direct access to the hardware resources, this deployment model isn’t always the best. For instance, the chipset within the wireless network adapter on a laptop may not support Monitoring mode and packet injection. Therefore, it is recommended to acquire a set of external wireless network adapters that do the following:
802.11a/b/g/n/ac
.