Working with wireless adapters
As an aspiring ethical hacking and penetration tester, you may be assigned to perform wireless penetration testing techniques on a targeted network with the intent of identifying any security vulnerabilities and assessing the attack surface to better understand how an adversary may be able to compromise the wireless network of an organization and gain unauthorized access.While many ethical hackers and penetration testers prefer to directly install Kali Linux on the local storage drive on their laptops for improve mobility and direct access to the hardware resources, this deployment model isn’t always the best. For instance, the chipset within the wireless network adapter on a laptop may not support monitoring mode and packet injection.
- Therefore, it’s recommended to acquire a set of external wireless networks adapters that supports the following features:
IEEE 802.11 standards such as 802.11a/b/g/n/ac. - Operates on the 2.4 GHz and 5 GHz bands...