Our Blog

We are passionate about modern day security

Dec13

One of the most common questions I still receive is: “What WiFi adapter should I use for pentesting?” Over the last 13 years, I have tested a very wide range of adapters, the good, the bad and some ugly. In this post, I will walk through my 2025 recommendations, discuss the modes that matter for pentesting, and explain how to get your adapter operational under Kali Linux.

WiFi Adapter


Standard Adapter Features

Under normal usage, wireless adapters typically operate in only one or two basic modes that allow them to connect to an infrastructure network (an access point) or a peer-to-peer network such as wireless tethering. These modes are rarely sufficient for security testing, where significantly more control over the radio is required.

These standard modes include:

  • Managed
  • Ad-Hoc / Mesh

There are many additional modes within 802.11, but for general users this list is adequate.

AdHoc vs Mesh


Modes Used by Pentesters

Pentesters rely on several additional operational modes, many of which are typically found in wireless routers and access points rather than consumer WiFi adapters. The two most relevant to security testing are:

  • Master
  • Monitor

Master mode allows an adapter to behave as an access point. Monitor mode, however, is the mode of choice for offensive security work due to its ability to passively capture and inject frames without standard firmware restrictions.


Monitor Mode

Firmware restrictions normally dictate which frames a device may send or receive. For example, when scanning for WiFi networks, a device should only send Probe Requests and listen for Beacon and Probe Responses intended for its own MAC. In standard operation, the firmware prevents the adapter from seeing frames destined for other devices.

Similarly, a device should not be permitted to send Association frames without first receiving a valid Authentication frame. The 802.11 state machine, shown below, illustrates permitted frame classes at each stage of the connection process.

WiFi State Machine

Now, on to the part you likely came here for: adapter recommendations and practical setup guidance.


Adapter Recommendations

Rather than reinvent the wheel, this is an excellent, actively maintained reference list:

https://github.com/morrownr/USB-WiFi/blob/main/home/Recommended_Adapters_for_Kali_Linux.md

For my own work, I currently use and recommend the Alfa Networks AWUS036ACH, which supports all modes needed for professional WiFi pentesting.

Product link:
https://www.amazon.com.au/Alfa-AWUS036ACH-Dual-Adaptor-AC1200/dp/B00VEEBOPG/

Installing the Driver (Kali Linux)

This adapter requires a custom driver, but modern Kali systems make installation straightforward:

sudo apt install -y linux-headers-$(uname -r) realtek-rtl88xxau-dkms  
sudo modprobe 88XXau

This installs kernel headers (required to build the driver) and the Realtek drivers for the 88XXau chipset. modprobe loads the driver immediately; otherwise, a reboot would be required. Some users report instability, but in my experience the AWUS036ACH has been consistent.

Limitations

The primary drawback is lack of 6 GHz support. As most tooling still requires patched drivers for 6 GHz operation, this is not a major practical limitation for 2025.

I also tested the AWUS036AXML, which does support 6 GHz and is plug-and-play, meaning no custom drivers required, assuming USB 3.0 is enabled. However, I went through four of these adapters (mt7912au chipset) within a single year. All failed within 12 months, so I cannot recommend it at this time.


Enabling Monitor Mode in Kali Linux

To freely send and receive arbitrary frames, monitor mode is required. Before enabling it, ensure NetworkManager does not interfere with your interface. Assuming your adapter appears as wlan0:

sudo nmcli dev set wlan0 managed no

This disables NetworkManager control of the interface.

Next, bring the interface down to change its mode:

sudo ifconfig wlan0 down

Enable monitor mode:

sudo iwconfig wlan0 mode monitor

Bring the interface back up:

sudo ifconfig wlan0 up

Now confirm injection capability:

sudo aireplay-ng -9 wlan0    
23:03:42  Trying broadcast probe requests...
23:03:42  Injection is working!
23:03:44  Found 1 AP 

23:03:44  Trying directed probe requests...
23:03:44  50:D4:F7:FF:EF:D8 - channel: 6 - 'WPA2'
23:03:44  Ping (min/avg/max): 0.091ms/0.488ms/0.569ms Power: -29.00
23:03:44  30/30: 100%

Injection Test


Looking to Build a Solid Foundation in WiFi Pentesting?

If you’re not ready for a full advanced program but want a structured, practical entry point into WiFi Penetration Testing, I did a recording of a live training a session specifically designed for newcomers and those looking to up skill in the WiFi space:

WiFi: Novice to Professional
https://training.thexero.co.uk/p/cohort-1

This practical course is the same material presented at conferences and security consultancies all over the world, teaching modern day WiFi penetration testing and is fully hands on in self-hosted virtual environment, and includes the following areas:

  • Wi-Fi fundamentals
  • Adapter requirements and recommendations
  • Managing Wi-Fi interfaces
  • WiFi channels
  • Hacking Personal WPA
  • WPA rogue access points
  • Hacking Enterprise WPA
  • Hacking Personal WPA3
  • Hacking Enterprise WPA
  • Protected Management Frames (PMF)
  • Clientless attacks on WPA2
  • Introduction to wireless pivots

It is structured to help you quickly become effective with the essential skills and tooling required for real world wireless penetration testing, without the added barrier




You May Also Enjoy