Kali Linux Wireless Penetration Testing Cookbook (eBook)
216 Seiten
Packt Publishing (Verlag)
978-1-78398-844-0 (ISBN)
Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes
About This Book
- Expose wireless security threats through the eyes of an attacker,
- Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,
- Acquire and apply key wireless pentesting skills used by industry experts
Who This Book Is For
If you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected.
What You Will Learn
- Deploy and configure a wireless cyber lab that resembles an enterprise production environment
- Install Kali Linux 2017.3 on your laptop and configure the wireless adapter
- Learn the fundamentals of commonly used wireless penetration testing techniques
- Scan and enumerate Wireless LANs and access points
- Use vulnerability scanning techniques to reveal flaws and weaknesses
- Attack Access Points to gain access to critical networks
In Detail
More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux.
This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed.
By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Style and approach
The book will provide the foundation principles, techniques, and in-depth analysis to effectively master wireless penetration testing. It will aid you in understanding and mastering many of the most powerful and useful wireless testing techniques in the industry.
Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposesAbout This BookExpose wireless security threats through the eyes of an attacker,Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,Acquire and apply key wireless pentesting skills used by industry expertsWho This Book Is ForIf you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected.What You Will LearnDeploy and configure a wireless cyber lab that resembles an enterprise production environmentInstall Kali Linux 2017.3 on your laptop and configure the wireless adapterLearn the fundamentals of commonly used wireless penetration testing techniquesScan and enumerate Wireless LANs and access pointsUse vulnerability scanning techniques to reveal flaws and weaknessesAttack Access Points to gain access to critical networksIn DetailMore and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux.This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed.By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.Style and approachThe book will provide the foundation principles, techniques, and in-depth analysis to effectively master wireless penetration testing. It will aid you in understanding and mastering many of the most powerful and useful wireless testing techniques in the industry.
Erscheint lt. Verlag | 13.12.2017 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 1-78398-844-4 / 1783988444 |
ISBN-13 | 978-1-78398-844-0 / 9781783988440 |
Haben Sie eine Frage zum Produkt? |
Größe: 8,3 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich