售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Kali Linux Wireless Penetration Testing Essentials
Table of Contents
Kali Linux Wireless Penetration Testing Essentials
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
1. Introduction to Wireless Penetration Testing
Phases of penetration testing
The planning phase
The discovery phase
The attack phase
The reporting phase
The executive summary
The technical report
Summary
2. Setting Up Your Machine with Kali Linux
Introduction to the Kali Linux distribution
Installing Kali Linux
Installation on a virtual machine
Creating a new virtual machine
Installation steps
Wireless adapter setup and configuration
Requirements of the wireless adapter
Wireless card configuration
Testing the adapter for wireless penetration testing
Troubleshooting
Summary
3. WLAN Reconnaissance
Introduction to 802.11 standard and wireless LAN
802.11 frames, types, and subtypes
Infrastructure mode and wireless access points
Wireless security
Wireless LAN scanning
Configuring the wireless adapter in monitor mode
Wireless scanning with airodump-ng
Wireless scanning with Kismet
Summary
4. WEP Cracking
An introduction to WEP
Attacks against WEP
WEP cracking with Aircrack-ng
Cracking the WEP key with connected clients
Cracking the WEP key without connected clients
The Fragmentation and ChopChop attacks
Forging and injecting ARP request frames
WEP cracking with automated tools
WEP cracking with Fern WiFi Cracker
Summary
5. WPA/WPA2 Cracking
An introduction to WPA/WPA2
Attacking the WPA
WPA cracking with Aircrack-ng
WPA cracking with Cowpatty
WPA cracking with the GPU
Pyrit
oclHashcat
WPA cracking with automated tools
Wifite
Summary
6. Attacking Access Points and the Infrastructure
Attacks against Wi-Fi Protected Setup
Reaver
Attacking WPA-Enterprise
Setting up a WPA-Enterprise network
Attacks targeting EAP
Attacking PEAP
Denial of Service attacks
DoS attacks with MDK3
Rogue access points
Attacking AP authentication credentials
Summary
7. Wireless Client Attacks
Honeypot access points and Evil Twin attacks
The Evil Twin attack in practice
Man-in-the-middle attacks
Ghost phisher
The Caffe Latte attack
The Hirte attack
Cracking WPA keys without the AP
Summary
8. Reporting and Conclusions
The four stages of report writing
Report planning
Information collection
Documentation tools
Writing the first draft
Review and finalization
The report format
The executive summary
The technical report
Summary
Conclusions
A. References
Chapter 1 – Introduction to Wireless Penetration Testing
Chapter 2 – Setting Up Your Machine with Kali Linux
Chapter 3 – WLAN Reconnaissance
Chapter 4 – WEP Cracking
Chapter 5 – WPA/WPA2 Cracking
Chapter 6 – Attacking Access Points and the Infrastructure
Chapter 7 – Wireless Client Attacks
Chapter 8 – Reporting and Conclusions
Index
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜