The first step to conduct a wireless attack is to conduct reconnaissance—this identifies the exact target access point and highlights the other wireless networks that could impact testing.
If you are using a USB-connected wireless card to connect to a Kali virtual machine, make sure that the USB connection has been disconnected from the host operating system and is attached to the VM by clicking on the USB connection icon , which is indicated by an arrow in the following screenshot:
Next, determine which wireless interfaces are available by running
iwconfig from the command line, as shown in the following screenshot:
For certain ...