O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing - Second Edition by Vijay Kumar Velu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Wireless reconnaissance

The first step to conduct a wireless attack is to conduct reconnaissance-this identifies the exact target access point and highlights the other wireless networks that could impact testing.

If you are using a USB-connected wireless card to connect to a Kali virtual machine, make sure that the USB connection has been disconnected from the host operating system and is attached to the virtual machine by clicking on the USB connection icon, which is indicated by an arrow in the following screenshot:

Next, determine which wireless interfaces are available by running iwconfig from the command line, as shown in the following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required