Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux: Wireless Penetration Testing Beginner's Guide

Buy

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

What you will learn

  • Create a wireless lab for your experiments
  • Sniff out wireless packets and hidden networks
  • Capture and crack WPA-2 keys
  • Discover hidden SSIDs
  • Explore the ins and outs of wireless technologies
  • Sniff probe requests and track users through SSID history
  • Attack radius authentication systems
  • Sniff wireless traffic and collect interesting data
  • Decrypt encrypted traffic with stolen keys

About the Authors

Vivek Ramachandran has been working in Wireless Security since 2003. He discovered the Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007 at DEF CON. In 2011, he was the first to demonstrate how malware could use Wi-Fi to create backdoors, worms, and even botnets. Earlier, he was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches and was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He is best known in the hacker community as the founder of SecurityTube.net, where he routinely posts videos on Wi-Fi Security and exploitation techniques.

Cameron Buchanan is an experienced penetration tester, having worked in a huge range of industries. He is also the author of Packt's Kali Linux CTF Blueprints.

Table of Contents

  1. Wireless Lab Setup
  2. WLAN and its Inherent Insecurities
  3. Bypassing WLAN Authentication
  4. WLAN Encryption Flaws
  5. Attacks on the WLAN Infrastructure
  6. Attacking the Client
  7. Advanced WLAN Attacks
  8. Attacking WPA-Enterprise and Radius
  9. WLAN Penetration Testing Methodology
  10. WPS and Probes
(HTML tags aren't allowed.)

STAMP 2 Communications and Control Projects
STAMP 2 Communications and Control Projects
CD-ROM WITH SOFTWARE, PHOTOS, SCHEMATICS, AND MORE!

EVERYTHING YOU NEED TO INCORPORATE THE STAMP II CONTROLLER INTO YOUR NEXT COMMUNICATIONS PROJECT

When it comes to adding power to complex electronic circuits, the BASIC STAMP II microprocessor is the standard against which all others are judged....

Software Testing and Continuous Quality Improvement, Second Edition
Software Testing and Continuous Quality Improvement, Second Edition
Numerous textbooks address software testing in a structured development
environment. By “structured” is meant a well-defined development cycle in
which discretely defined steps provide measurable outputs at each step. It
is assumed that software testing activities are based on clearly defined
requirements and
...
User-Centered Information Design for Improved Software Usability (Artech House Computer Science Library)
User-Centered Information Design for Improved Software Usability (Artech House Computer Science Library)
Describes a unique user-centered design method that helps the software project team decide what information to provide and in what media, based on user's information needs and project requirements. DLC: User interfaces (Computer systems).

About the Author

Pradeep Henry has more than 10 years
...

Hardcore Java
Hardcore Java

Studying a computer language is a career-long process. Many developers make the mistake of thinking that they have learned enough. They get caught in the corporate cycle of build-and-deploy and don't seek to expand their knowledge. However, we can hardly blame them for that.

For one, the...

Knots: The Complete Visual Guide
Knots: The Complete Visual Guide
Knots have been used throughout history, and they remain a valuable resource today. Learning to tie knots is a handy, enjoyable skill, requiring only simple equipment to get started.

This book contains a selection of knots intended to be practical and instructive. Many of them have specific purposes,
...
Practical Procedures in Elective Orthopaedic Surgery: Pelvis and Lower Extremity
Practical Procedures in Elective Orthopaedic Surgery: Pelvis and Lower Extremity

With the time available to surgeons-in-training ever dwindling, there is great emphasis placed on practical learning tools. Mirroring his earlier book on practical procedures in trauma surgery, Prof Giannoudis has produced a reference in more elective techniques. In most medical schools, most emphasis is placed on orthopaedic trauma surgery,...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy