By
Michael Hammond
October 11, 2016
•
7
min read
We promised to write about the tools of our trade. A few of the services we perform, whether it's Vulnerability Assessment or Penetration Testing, we usually will perform some type of wireless review. While we will talk about the software products used in another post, in this installment, we describe the ALFA Network, Atheros AR9271 IEEE 802.11b/g/n Long-Range USB Adapter, model # AWUS036NHA.While this adapter can be used to add wireless networking to a computer that has an extra USB port, it is more often used by wireless penetration testers because the chipset included in the device allow the card to enter monitor (promiscuous) mode and the ability to inject and capture packets at the same time. These two last functions are the most important.
While these testers are using these tools, the best part of this "special" adapter is its price. The ALFA USB adapter retails for $30 to $40 on any number of sites, including Amazon. It makes sense to include some of these in your internal testing program. In another blog series, we will detail HOW to use these cards.To learn more about the tools of our trade, contact us at 617-471-1120 today!

Audit. Security. Assurance.
IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.
Contact Info
OCD Tech
25 BHOP, Suite 407, Braintree MA, 02184
844-623-8324
https://ocd-tech.com
Follow Us
Videos
Check Out the Latest Videos From OCD Tech!
Services
SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®
IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review
IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO