In this section, we will study NetHunter's tools for exploiting networks and wireless devices. We will also learn about choosing hardware adapters for testing, and look at some techniques for securing a system.
The following chapters are in this section:
- Chapter 8, Packet Sniffing and Traffic Analysis
- Chapter 9, Targeting Wireless Devices and Network
- Chapter 10, Avoiding Detection
- Chapter 11, Hardening Techniques and Countermeasures