In this chapter, we took a look at a few microcomputers that support the Kali Linux operating system. These devices would allow a penetration tester to create their own network implants for a target network. We covered the supported list of mobile devices when reviewing methods of compiling a custom Kali NetHunter image for a specific device. Finally, penetration testing is never complete without a wireless network adapter, so a list of known supported wireless adapters for mobile devices was provided.
I hope this chapter and book has been helpful and useful for your studies, and will benefit you along your path in cybersecurity. Thank you for your attention!