Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux: Wireless Penetration Testing Beginner's Guide

Buy

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

What you will learn

  • Create a wireless lab for your experiments
  • Sniff out wireless packets and hidden networks
  • Capture and crack WPA-2 keys
  • Discover hidden SSIDs
  • Explore the ins and outs of wireless technologies
  • Sniff probe requests and track users through SSID history
  • Attack radius authentication systems
  • Sniff wireless traffic and collect interesting data
  • Decrypt encrypted traffic with stolen keys

About the Authors

Vivek Ramachandran has been working in Wireless Security since 2003. He discovered the Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007 at DEF CON. In 2011, he was the first to demonstrate how malware could use Wi-Fi to create backdoors, worms, and even botnets. Earlier, he was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches and was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He is best known in the hacker community as the founder of SecurityTube.net, where he routinely posts videos on Wi-Fi Security and exploitation techniques.

Cameron Buchanan is an experienced penetration tester, having worked in a huge range of industries. He is also the author of Packt's Kali Linux CTF Blueprints.

Table of Contents

  1. Wireless Lab Setup
  2. WLAN and its Inherent Insecurities
  3. Bypassing WLAN Authentication
  4. WLAN Encryption Flaws
  5. Attacks on the WLAN Infrastructure
  6. Attacking the Client
  7. Advanced WLAN Attacks
  8. Attacking WPA-Enterprise and Radius
  9. WLAN Penetration Testing Methodology
  10. WPS and Probes
(HTML tags aren't allowed.)

Building Reputational Capital: Strategies for Integrity and Fair Play that Improve the Bottom Line
Building Reputational Capital: Strategies for Integrity and Fair Play that Improve the Bottom Line

In the aftermath of scandals such as those at Enron and WorldCom, there is a growing suspicion of the corporate world. For this reason it is more important than ever for firms to maintain a good reputation. In Building Reputational Capital, Kevin T. Jackson offers a practical guide to taking the high road--the only path that leads to...

The Essential Guide to Video Processing
The Essential Guide to Video Processing
The most up-to-date and state-of-the art- introduction to video processing concepts, standards and applications.

This comprehensive and state-of-the art approach to video processing gives engineers and students a comprehensive introduction and includes full coverage of key applications: wireless video, video networks, video
...
Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives
Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives

With software and hardware development techniques improving constantly, it’s surprising to learn that more than half of all technology projects overrun their schedules and budgets by 200 percent or more. Computerworld magazine recently reported several surveys showing that project failure is overwhelmingly traceable to poorly...


Lotus Notes Domino 8: Upgrader's Guide
Lotus Notes Domino 8: Upgrader's Guide
Written by senior architects and specialists of IBM Software Services for Lotus, this book for power users, administrators, and developers working with any version of Lotus Notes/Domino who want to upgrade is a complete guide to the most powerful new features and changes in Lotus Notes/Domino 8. It walks through the new features in the Lotus...
XML for Bioinformatics
XML for Bioinformatics

XML for Bioinformatics aims to provide biologists, software engineers, and bioinformatics professionals with a comprehensive introduction to XML and current XML applications in bioinformatics. The book will assume no background in XML, and take readers from basic to intermediate XML concepts. Core topics will include:...

Bupleurum Species: Scientific Evaluation and Clinical Applications (Traditional Herbal Medicines for Modern Times)
Bupleurum Species: Scientific Evaluation and Clinical Applications (Traditional Herbal Medicines for Modern Times)

The prominence of the Bupleurum species cannot be overstated. Across China and Japan, it serves as a main or supplementary ingredient in over two thirds of traditional medications. For over 2000 years, it has been used to treat fevers, intestinal maladies, malaria, and countless other afflictions. Modern research indicates that it may possess...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy