As you have almost completed this book, there are still a few important details and components that we needed to discuss to ensure you're all set and ready for your penetration testing journey.
In this chapter, we will be covering the following topics:
- Suitable mobile hardware for Kali Linux
- External components
- Additional hardware
During the course of this book, you have learned about the field of penetration testing, specifically using mobile devices to execute real-world, simulated attacks, and analyses on a target system or network. However, selecting an appropriate device for Kali Linux can sometimes be a bit troublesome. As a student, security professional, penetration tester, or someone who is starting a path in cybersecurity, especially in penetration testing, you may have the following questions:
- Could Kali NetHunter work on...