After our first post of introduction on wireless penetration testing or wireless hacking we are back with another post on what are basics requirements, tools and operating system needed for doing these kind of penetration testing.
Not all the attacks on wifi network need to be connected to that wifi on which we are going to attack.
Attacks like de-authenticating any client from any router,...