Skip to Main Content
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
book

Mastering Kali Linux for Advanced Penetration Testing - Third Edition

by Vijay Kumar Velu, Robert Beggs
January 2019
Intermediate to advanced content levelIntermediate to advanced
548 pages
12h 7m
English
Packt Publishing
Content preview from Mastering Kali Linux for Advanced Penetration Testing - Third Edition

Wireless reconnaissance

The first step in conducting a wireless attack is to conduct reconnaissance—this identifies the exact target access point and highlights the other wireless networks that could impact testing.

If you are using a USB-connected wireless card to connect to a Kali virtual machine, make sure that the USB connection has been disconnected from the host operating system and that it is attached to the virtual machine by clicking on the USB connection icon, which is indicated by an arrow in the following screenshot:

Next, determine which wireless interfaces are available by running iwconfig from the command line, as shown in the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Kali Linux for Advanced Penetration Testing, Second Edition - Second Edition

Mastering Kali Linux for Advanced Penetration Testing, Second Edition - Second Edition

Vijay Kumar Velu
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition

Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition

Shiva V. N. Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali

Publisher Resources

ISBN: 9781789340563Supplemental Content