After completing CCNA Security in March 2018, I set my sights on the certifications offered by Offensive Security and decided on the Offensive Security Wireless Professional (OSWP) certification to complement my existing knowledge of wireless.
The labs in the Offensive Security Wireless Attacks course are self-hosted. That means you will need to obtain the wireless adapter and wireless AP yourself in order to do the labs.
After lengthy research and testing to ensure that basic functionality such as monitor mode and packet injection are working in Aircrack-ng, I finally settled on Alfa Network’s AWUS1900 USB wireless adapter.
Unlike the Alfa Network AWUS036H recommended by OffSec, the AWUS1900 is 802.11a,b,g,n and ac capable giving you the flexibility of using it for further experimentation after you are done with the Offensive Security Wireless Attacks course.
Do note that it is not mandatory for you to get the wireless adapters recommended by OffSec. With some research, you can get one that can be set to monitor mode and perform injection in Aircrack-ng.
The AWUS1900 uses the realtek RTL8814AU chipset which supports 4×4 MIMO and 3 spatial streams making it a beast of a wireless adapter. However, there is a known caveat when using the RTL8814AU chipset with Aircrack-ng which I will cover in the next post.
In the box
The AWUS1900 arrived in a box with a picture of it printed at the front and other marketing to entice the layman to buy this wireless adapter because its’ powerful (which it is if you look under the bonnet).
Opening up the box reveals the following contents:
- The AWUS1900 wireless adapter itself
- 4x dual band 5-dBi antennas
- A USB3.0 cable
- Laptop clip-on mount with suction cup
- CD contain drivers
- An installation warning and instruction
- Alfa Network sticker
The AWUS1900 itself is small enough to fit in the palm of my hands which would allow you to remain inconspicuous while you are casing the wireless joint!
Stay tune for the upcoming post on how to correctly set up your AWUS1900 for wireless penetration testing on Kali Linux!