How To Install & Use Wireshark On Kali Linux<\/a><\/li>\n<\/ul>\n\n\n\n<\/p>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
Cracking Wi-Fi networks is one of the main use of the Kali Linux toolkit, and it has always been. I remember playing Aircrack-NG when I was at school, many years ago. The process was a bit complicated, but hopefully, it’s now easier than ever, thanks to a new tool: Wifite. I’ll show you how to…<\/p>\n","protected":false},"author":1,"featured_media":806,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[16],"tags":[],"taxonomy_info":{"category":[{"value":16,"label":"Kali Linux"}]},"featured_image_src_large":["https:\/\/infosecscout.com\/wp-content\/uploads\/2023\/01\/wifite-kali-linux-1024x683.jpg",1024,683,true],"author_info":{"display_name":"Patrick Fromaget","author_link":"https:\/\/infosecscout.com\/about\/"},"comment_info":0,"category_info":[{"term_id":16,"name":"Kali Linux","slug":"kali-linux","term_group":0,"term_taxonomy_id":16,"taxonomy":"category","description":"Jump into our Kali Linux Tutorials. They're perfect for getting the hang of this cool Linux distribution. We make it easy to learn the basics and a bit more!","parent":0,"count":37,"filter":"raw","cat_ID":16,"category_count":37,"category_description":"Jump into our Kali Linux Tutorials. They're perfect for getting the hang of this cool Linux distribution. We make it easy to learn the basics and a bit more!","cat_name":"Kali Linux","category_nicename":"kali-linux","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/posts\/793"}],"collection":[{"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/comments?post=793"}],"version-history":[{"count":9,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/posts\/793\/revisions"}],"predecessor-version":[{"id":810,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/posts\/793\/revisions\/810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/media\/806"}],"wp:attachment":[{"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/media?parent=793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/categories?post=793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/tags?post=793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}