Kali Linux: Wireless Penetration Testing Beginner’s Guide Front Cover

Kali Linux: Wireless Penetration Testing Beginner’s Guide

  • Length: 261 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2015-03-20
  • ISBN-10: 1783280417
  • ISBN-13: 9781783280414
  • Sales Rank: #637396 (See Top 100 Books)
Description

Master wireless testing techniques to survey and attack wireless networks with Kali Linux

About This Book

  • Learn wireless penetration testing with Kali Linux; Backtrack’s evolution
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Who This Book Is For

If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

In Detail

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner’s Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

Table of Contents

Chapter 1: Wireless Lab Setup
Chapter 2: WLAN and its Inherent Insecurities
Chapter 3: Bypassing WLAN Authentication
Chapter 4: WLAN Encryption Flaws
Chapter 5: Attacks on the WLAN Infrastructure
Chapter 6: Attacking the Client
Chapter 7: Advanced WLAN Attacks
Chapter 8: Attacking WPA-Enterprise and RADIUS
Chapter 9: WLAN Penetration Testing Methodology
Chapter 10: WPS and Probes
Appendix: Pop Quiz Answers

To access the link, solve the captcha.