Notes:
(1) Equipment: You need to have administrative privilege, or begiven consent to administrative privilege, to a computer/laptop(the pen-tester or attacker machine), a Wifi router (access point)running the WPA/WPA2-PSK security protocol, and another Windowsmachine as the target/victim machine, all connected in a wirelessLAN environment.
(2) Tools: You need to run Linux on the pen-tester machine (such asKali Linux). Specific tools of Kali Linux to be used include (butnot limited to): Aircrack-ng suite, Metaspolit, nmap, etc. You maydownload Kali Linux and make a bootable USB drive to run Kali Linuxon your computer/laptop (see instructions athttps://docs.kali.org/downloading/kali-linux-live-usb-install fordetails). Alternatively, you may install Virtualbox on yourcomputer/laptop
PayPal Gateway not configured
PayPal Gateway not configured