
上QQ阅读APP看书,第一时间看更新
Summary
In this chapter, we introduced wireless penetration testing and provided a brief description of the four main phases in which it is pided: planning, discovery, attack, and reporting.
In the next chapter, we will see how to install Kali Linux on your computer and we will examine the requisites that your wireless adapter must meet to get started with wireless penetration testing.