Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux: Wireless Penetration Testing Beginner's Guide

Buy

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

What you will learn

  • Create a wireless lab for your experiments
  • Sniff out wireless packets and hidden networks
  • Capture and crack WPA-2 keys
  • Discover hidden SSIDs
  • Explore the ins and outs of wireless technologies
  • Sniff probe requests and track users through SSID history
  • Attack radius authentication systems
  • Sniff wireless traffic and collect interesting data
  • Decrypt encrypted traffic with stolen keys

About the Authors

Vivek Ramachandran has been working in Wireless Security since 2003. He discovered the Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007 at DEF CON. In 2011, he was the first to demonstrate how malware could use Wi-Fi to create backdoors, worms, and even botnets. Earlier, he was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches and was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He is best known in the hacker community as the founder of SecurityTube.net, where he routinely posts videos on Wi-Fi Security and exploitation techniques.

Cameron Buchanan is an experienced penetration tester, having worked in a huge range of industries. He is also the author of Packt's Kali Linux CTF Blueprints.

Table of Contents

  1. Wireless Lab Setup
  2. WLAN and its Inherent Insecurities
  3. Bypassing WLAN Authentication
  4. WLAN Encryption Flaws
  5. Attacks on the WLAN Infrastructure
  6. Attacking the Client
  7. Advanced WLAN Attacks
  8. Attacking WPA-Enterprise and Radius
  9. WLAN Penetration Testing Methodology
  10. WPS and Probes
(HTML tags aren't allowed.)

Expert Resumes for Computer and Web Jobs, 3rd Ed
Expert Resumes for Computer and Web Jobs, 3rd Ed

Job search and career management become remarkably more complex and more competitive with each passing year. One major contributor to the new complexity is technology itself, which has created entirely new methods and systems for job search, recruitment, hiring, and lifelong career development.

Fortunately, this new...

Advances in Data Mining - Theoretical Aspects and Applications: 7th Industrial Conference, ICDM 2007
Advances in Data Mining - Theoretical Aspects and Applications: 7th Industrial Conference, ICDM 2007

The papers in this volume represent the proceedings of the 7th Industrial Conference on Data Mining. They are organized into topical sections on aspects of classification and prediction, clustering, web mining, data mining in medicine, applications of data mining, time series and frequent pattern mining, and association rule mining. Readers...

Cisco Network Design Solutions for Small-Medium Businesses
Cisco Network Design Solutions for Small-Medium Businesses

Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.

  • Design and implement effective network solutions by mastering the design process that is used by...


Oracle ADF 11gR2 Development Beginner's Guide
Oracle ADF 11gR2 Development Beginner's Guide

Oracle ADF is an end-to-end framework which makes application development simple by providing infrastructure services as well as visual and declarative development right away.

"Oracle ADF 11gR2 Development Beginner's Guide" guides any user with programming skills to be able to quickly learn the options and ways to...

Network Management Know It All (Morgan Kaufmann Know It All)
Network Management Know It All (Morgan Kaufmann Know It All)
This book brings all of the elements of network management together in a single volume by the best and brightest experts in the field!

Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems, which includes
...
Wiring Systems and Fault Finding, Fourth Edition: For Installation Electricians
Wiring Systems and Fault Finding, Fourth Edition: For Installation Electricians
The non-electrician's guide to wiring systems - an essential reference for plumbers, heating engineers, television and intruder alarm installers

This book deals with an area of practice which many students and non-electricians find particularly challenging. It explains how to interpret circuit diagrams, wiring systems and the
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy