You can find a few online resources suggesting some USB wireless adapters that are compatible with BackTrack 5, but most of them are either outdated or simply recommend the Alfa AWUS036H which only supports B and G wireless standards but not N. To help you in purchasing the correct adapter, here we list the safest USB wireless network adapter that we’ve tested to have the best plug and play compatibility with BackTrack 5, Kali Linux and Aircrack-ng. The chipset on a USB wireless adapter is the most important information but normally is not shown on the product box or even on the device itself. The version 1 uses two different chipsets, which is Atheros AR9170 and AR9102 while version 2 has the Atheros AR7010 and AR9287 chipsets, and the latest version 3 uses Realtek RTL8192CU. For example, the TL-WN822N USB wireless adapter by TP-LINK comes with 3 versions. If you’re looking to purchase a fully compatible plug and play USB wireless adapter that works really well with BackTrack 5, it can be tricky because some brands with the exact model can have a different chipset for different version numbers. It is relatively easy to get BackTrack running by installing using UNetbootin and booting up the live version from USB but the most important thing is to make sure that your USB wireless adapter supports monitor mode and packet injection.
The reason why BackTrack is being used instead of Windows is because there are no patched drivers available for Windows that supports injection, unless you are willing to fork out $300 or $700 for an AirPcap TX/NX adapter.
Play nice, support each other and encourage learning.BackTrack is a very popular free Linux distribution that is commonly being used to hack into wireless networks by using Aircrack-ng to crack the WEP/WPA encryption. We are not tech support, these posts should be kept on /r/techsupportĭon't be a dick. Low-effort content will be removed at moderator discretion from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam. Spam is strictly forbidden and will result in a ban. Sharing of personal data is forbidden - no doxxing or IP dumping
No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. "How does HSTS prevent SSL stripping?" is a good question. Intermediate questions are welcomed - e.g.
Asking how to get into your "girlfriend's" instagram.This is not the place to try to find hackers to do your dirty work and you will be banned for trying. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not Hacking can be a grey area but keep it above board. "TeenagerĪrrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering".
Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!īans are handed out at moderator discretion.Īnother one got caught today, it's all over the papers. This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials any beginner questions should be directed there as they will result in a ban here. What we are about: quality and constructive discussion about the culture, profession and love of hacking. A subreddit dedicated to hacking and hacking culture.