Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

EH-Net - Wyllie - Wireless Pentesting Part 2 - Building a WiFi Hacking RigIn the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a system before starting an engagement. We also covered three general assessment levels and the differences between them. But most importantly in regards to a wireless pentest, we covered why wireless networks assessments should be a stand-alone item yet still be a part of the scope of a wider pentest. Even though you’ll learn some effective WiFi hacking tricks, the overall goal is to incorporate them into the job aspects of a professional.

In this second part of the series, it’s time to get the right equipment for your tool bag. We are going to discuss the hardware, operating systems, and software requirements for setting up your own wireless pentesting rig. Your mileage may vary, but, based on years of experience and numerous engagements, this is a great WiFi hacking rig to get you started and should cover most needs. As you gain experience, you may find that some tools are better than others while also finding the need to expand beyond this simple setup for more advanced requests from clients.

Hardware Requirements

Laptop – Mac or PC Based system

  • 8GB RAM minimum, 16GB RAM or better preferred
  • 20GB hard drive space

Wireless Adapter (below are some popular adapters)
EH-Net - Wyllie - Wireless Pentesting Part 2 - Building a WiFi Hacking Rig - Alfa Cards

  • Alfa AWUS036H
  • Alfa AWUS036NEH
  • Alfa AWUS036NH
  • Alfa AWUS036NHA
  • Alfa AWUS051NH
  • TP-Link TL-WN722N

Choosing the correct adapter can be a daunting task with varying sizes, prices and capabilities. ALFA adapters are the most popular when it comes to wireless pentesting, so much so that they have their own page dedicated to Kali WiFi USB. So instead of wasting time with drivers and in testing whether your adapter can be (Read more...)

*** This is a Security Bloggers Network syndicated blog from The Ethical Hacker Network authored by Phillip Wylie. Read the original post at: