diff --git a/wireless_resources/wireless_adapters b/wireless_resources/wireless_adapters index 0a4a464..b21f1b1 100644 --- a/wireless_resources/wireless_adapters +++ b/wireless_resources/wireless_adapters @@ -1,6 +1,5 @@ # Penetration Testing and Wireless Adapters -As you learned in the course, there are many challenges with different wireless adapters, Linux, and wireless penetration testing tools. This is a fact especially when trying to perform promiscuous monitoring and injecting packets into the wireless network. - +As you learned in the course, there are many challenges with different wireless adapters, Linux, and wireless penetration testing tools. This is a fact especially when trying to perform promiscuous monitoring and injecting packets into the wireless network. The following are some of the most popular wireless adapters used by penetration testers (ethical hackers) in the industry. **Note**: If you know of others and have some success stories, please feel free to contribute by requesting a pull request or by opening a GitHub issue.