万本电子书0元读

万本电子书0元读

顶部广告

BackTrack – Testing Wireless Network Security电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:Kevin Cardwell

出  版  社:Packt Publishing

出版时间:2013-06-25

字       数:12.8万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.
目录展开

BackTrack – Testing Wireless Network Security

Table of Contents

BackTrack – Testing Wireless Network Security

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Installing and Configuring BackTrack

Downloading and configuring BackTrack

Installing BackTrack

Updating BackTrack

Validating the interfaces

Customizing Gnome

New wave theme

Creating a virtual machine

Summary

2. Working with the Wireless Card

Checking card compatibility

Detecting the wireless card during the boot process

Detecting the wireless card using iwconfig

Configuring the wireless card

Wireless card modes

Protocol analysis with the network card

Summary

3. Surveying Your Wireless Zone

Exploring devices

Working with tools

Using Kismet for access point discovery

Discovering hidden access points

Summary

4. Breaching Wireless Security

Different types of attacks

Cracking WEP and WPA

Performing an attack using WEP and ChopChop

Summary

5. Securing Your Wireless Network

Configuring initial wireless security

Defending from surveillance

Configuring encryption

Settings that provide protection from masquerade and rogue AP attacks

Summary

A. Wireless Tools

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部