万本电子书0元读

万本电子书0元读

顶部广告

Kali Linux Wireless Penetration Testing Essentials电子书

售       价:¥

4人正在读 | 0人评论 9.8

作       者:Marco Alamanni

出  版  社:Packt Publishing

出版时间:2015-07-30

字       数:46.4万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.
目录展开

Kali Linux Wireless Penetration Testing Essentials

Table of Contents

Kali Linux Wireless Penetration Testing Essentials

Credits

Disclaimer

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

1. Introduction to Wireless Penetration Testing

Phases of penetration testing

The planning phase

The discovery phase

The attack phase

The reporting phase

The executive summary

The technical report

Summary

2. Setting Up Your Machine with Kali Linux

Introduction to the Kali Linux distribution

Installing Kali Linux

Installation on a virtual machine

Creating a new virtual machine

Installation steps

Wireless adapter setup and configuration

Requirements of the wireless adapter

Wireless card configuration

Testing the adapter for wireless penetration testing

Troubleshooting

Summary

3. WLAN Reconnaissance

Introduction to 802.11 standard and wireless LAN

802.11 frames, types, and subtypes

Infrastructure mode and wireless access points

Wireless security

Wireless LAN scanning

Configuring the wireless adapter in monitor mode

Wireless scanning with airodump-ng

Wireless scanning with Kismet

Summary

4. WEP Cracking

An introduction to WEP

Attacks against WEP

WEP cracking with Aircrack-ng

Cracking the WEP key with connected clients

Cracking the WEP key without connected clients

The Fragmentation and ChopChop attacks

Forging and injecting ARP request frames

WEP cracking with automated tools

WEP cracking with Fern WiFi Cracker

Summary

5. WPA/WPA2 Cracking

An introduction to WPA/WPA2

Attacking the WPA

WPA cracking with Aircrack-ng

WPA cracking with Cowpatty

WPA cracking with the GPU

Pyrit

oclHashcat

WPA cracking with automated tools

Wifite

Summary

6. Attacking Access Points and the Infrastructure

Attacks against Wi-Fi Protected Setup

Reaver

Attacking WPA-Enterprise

Setting up a WPA-Enterprise network

Attacks targeting EAP

Attacking PEAP

Denial of Service attacks

DoS attacks with MDK3

Rogue access points

Attacking AP authentication credentials

Summary

7. Wireless Client Attacks

Honeypot access points and Evil Twin attacks

The Evil Twin attack in practice

Man-in-the-middle attacks

Ghost phisher

The Caffe Latte attack

The Hirte attack

Cracking WPA keys without the AP

Summary

8. Reporting and Conclusions

The four stages of report writing

Report planning

Information collection

Documentation tools

Writing the first draft

Review and finalization

The report format

The executive summary

The technical report

Summary

Conclusions

A. References

Chapter 1 – Introduction to Wireless Penetration Testing

Chapter 2 – Setting Up Your Machine with Kali Linux

Chapter 3 – WLAN Reconnaissance

Chapter 4 – WEP Cracking

Chapter 5 – WPA/WPA2 Cracking

Chapter 6 – Attacking Access Points and the Infrastructure

Chapter 7 – Wireless Client Attacks

Chapter 8 – Reporting and Conclusions

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部