Summary

In this chapter, we learned what a network is and how it works, and also studied basic network terminology and how to connect the wireless adapter to the virtual Kali machine. Mostly, we will only need this adapter for network penetration testing, to crack passwords. We also saw the important concept of MAC addresses, which are unique for every machine. Also, we saw how we can alter our MAC address so that we cannot be traced when hacking. Finally, we learned how we can enable monitor mode by using three different techniques.

In the next chapter, we will learn how to perform network penetration testing. 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.203.172