I just listened to the wireless attacks episode in the Kali Linux series and wanted to let you know, in the hopes that this will save others some trial and error, that back in January I had some success practising wi-fi pentesting in a virtual lab with the following setup which I've validated today under the upgraded build.

  • Oracle VirtualBox 4.3.28 r100309
  • VirtualBoxGuestAdditions 4.3.20 (I hadn't yet updated to 4.3.28)
  • Kali Linux 1.1.0
  • linux-headers-3.18.0-kali3-amd64
  • ALFA Network Long Range USBAdapter AWUS036NHA (Atheros AR9271 Wireless Network Adapter)

Connect USB Wireless Adapter to Kali Linux in Virtualbox to avoid issues. This was the youtube video I found helpful at the time.

If using airmon-ng make sure that you lock the monitor interface to a specific channel for the packet injection to work.

  • Extract from the wiki
    Make sure the card(s) are on the same channel as your AP and locked on this channel. When putting your card into monitor mode, be sure to specify the channel via airmon-ng. You can use iwconfig to confirm which channel your card is currently on. The injection test will fail if your card and access point are on different channels.
    Make sure your card is not channel hopping. A very common mistake is to have airodump-ng running in channel hopping mode. If you use airodump-ng, be sure to use the ”-c <channel>” option. Additionally, ensure all network managers and similar are killed off.

Final comment
I found this setup to be relatively stable although not as stable as running a live kali linux distribution on an old laptop with the wireless usb adapter plugged into that. Hope that helps :)

Is it perhaps possible to put a note into shownotes to this effect on the relevant episode?