Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Summary


This chapter provided you with detailed instructions on how to set up your own wireless lab. Also, in the process, you learned the basic steps for:

  • Installing Kali on your hard drive and exploring other options such as Virtual Machines and USBs

  • Configuring your access point over the web interface

  • Understanding and using several commands to configure and use your wireless card

  • Verifying the connection state between the wireless client and the access point

It is important that you gain confidence in configuring the system. If you aren't confident, it is advisable that you repeat the preceding examples a couple of times. In later chapters, we will design more complicated scenarios.

In the next chapter, we will learn about inherent design-based insecurities in WLANs design. We will use the network analyzer tool, Wireshark, to understand these concepts in a practical way.