From 18648857ae2a7352e45d1a00866793c84dde3a88 Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Thu, 29 Jul 2021 12:11:37 -0400 Subject: [PATCH] Update wireless_adapters.md --- wireless_resources/wireless_adapters.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/wireless_resources/wireless_adapters.md b/wireless_resources/wireless_adapters.md index 55f4432..fc8b3b7 100644 --- a/wireless_resources/wireless_adapters.md +++ b/wireless_resources/wireless_adapters.md @@ -1,5 +1,5 @@ # Penetration Testing and Wireless Adapters -As you learned in the course, there are many challenges with different wireless adapters, Linux, and wireless penetration testing tools. This is a fact especially when trying to perform promiscuous monitoring and injecting packets into the wireless network. +As you learned either in one of my books, courses, or in the Internet, there are many challenges with different wireless adapters, Linux, and wireless penetration testing tools. This is a fact especially when trying to perform promiscuous monitoring and injecting packets into the wireless network. The following are some of the most popular wireless adapters used by penetration testers (ethical hackers) in the industry.