eBook - ePub
Kali Linux Wireless Penetration Testing: Beginner's Guide
Vivek Ramachandran, Cameron Buchanan
This is a test
Partager le livre
- 214 pages
- English
- ePUB (adapté aux mobiles)
- Disponible sur iOS et Android
eBook - ePub
Kali Linux Wireless Penetration Testing: Beginner's Guide
Vivek Ramachandran, Cameron Buchanan
DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations
Ă propos de ce livre
About This Book
- Learn wireless penetration testing with Kali Linux; Backtrack's evolution
- Detect hidden wireless networks and discover their names
- Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
- Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks
Who This Book Is For
If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.
Foire aux questions
Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier lâabonnement ». Câest aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via lâapplication. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă la bibliothĂšque et Ă toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode dâabonnement : avec lâabonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă 12 mois dâabonnement mensuel.
Quâest-ce que Perlego ?
Nous sommes un service dâabonnement Ă des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă toute une bibliothĂšque pour un prix infĂ©rieur Ă celui dâun seul livre par mois. Avec plus dâun million de livres sur plus de 1 000 sujets, nous avons ce quâil vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Ăcouter sur votre prochain livre pour voir si vous pouvez lâĂ©couter. Lâoutil Ăcouter lit le texte Ă haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, lâaccĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Kali Linux Wireless Penetration Testing: Beginner's Guide est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă Kali Linux Wireless Penetration Testing: Beginner's Guide par Vivek Ramachandran, Cameron Buchanan en format PDF et/ou ePUB ainsi quâĂ dâautres livres populaires dans Computer Science et Cyber Security. Nous disposons de plus dâun million dâouvrages Ă dĂ©couvrir dans notre catalogue.
Informations
Sujet
Computer ScienceSous-sujet
Cyber SecurityKali Linux Wireless Penetration Testing Beginner's Guide
Table of Contents
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Disclaimer
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
1. Wireless Lab Setup
Hardware requirements
Software requirements
Installing Kali
Time for action â installing Kali
What just happened?
Have a go hero â installing Kali on VirtualBox
Setting up the access point
Time for action â configuring the access point
What just happened?
Have a go hero â configuring the access point to use WEP and WPA
Setting up the wireless card
Time for action â configuring your wireless card
What just happened?
Connecting to the access point
Time for action â configuring your wireless card
What just happened?
Have a go hero â establishing a connection in a WEP configuration
Pop quiz â understanding the basics
Summary
2. WLAN and its Inherent Insecurities
Revisiting WLAN frames
Time for action â creating a monitor mode interface
What just happened?
Have a go hero â creating multiple monitor mode interfaces
Time for action â sniffing wireless packets
What just happened?
Have a go hero â finding different devices
Time for action â viewing management, control, and data frames
What just happened?
Have a go hero â playing with filters
Time for action â sniffing data packets for our network
What just happened?
Have a go hero â analyzing data packets
Time for action â packet injection
What just happened?
Have a go hero â installing Kali on VirtualBox
Important note on WLAN sniffing and injection
Time for action â experimenting with your adapter
What just happened?
Have a go hero â sniffing multiple channels
The role of regulatory domains in wireless
Time for action â experimenting with your adapter
What just happened?
Have a go hero â exploring regulatory domains
Pop quiz â WLAN packet sniffing and injection
Summary
3. Bypassing WLAN Authentication
Hidden SSIDs
Time for action â uncovering hidden SSIDs
What just happened?
Have a go hero â selecting deauthentication
MAC filters
Time for action â beating MAC filters
What just happened?
Open Authentication
Time for action â bypassing Open Authentication
What just happened?
Shared Key Authentication
Time for action â bypassing Shared Authentication
What just happened?
Have a go hero â filling up the access point's tables
Pop quiz â WLAN authentication
Summary
4. WLAN Encryption Flaws
WLAN encryption
WEP encryption
Time for action â cracking WEP
What just happened?
Have a go hero â fake authentication with WEP cracking
WPA/WPA2
Time for action â cracking WPA-PSK weak passphrases
What just happened?
Have a go hero â trying WPA-PSK cracking with Cowpatty
Speeding up WPA/WPA2 PSK cracking
Time for action â speeding up the cracking process
What just happened?
Decrypting WEP and WPA packets
Time for action â decrypting WEP and WPA packets
What just happened?
Connecting to WEP and WPA networks
Time for action â connecting to a WEP network
What just happened?
Time for action â connecting to a WPA network
What just happened?
Pop quiz â WLAN encryption flaws
Summary
5. Attacks on the WLAN Infrastructure
Default accounts and credentials on the access point
Time for action â cracking default accounts on the access points
What just happened?
Have a go hero â cracking accounts using brute-force attacks
Denial of service attacks
Time for action â deauthentication DoS attacks
What just happened?
Have a go hero â disassociation attacks
Evil twin and access point MAC spoofing
Time for action â evil twins and MAC spoofing
What just happened?
Have a go hero â evil twins and channel hopping
A rogue access point
Time for action â cracking WEP
What just happened?
Have a go hero â rogue access point challenge
Pop quiz â attacks on the WLAN infrastructure
Summary
6. Attacking the Client
Honeypot and Mis-Association attacks
Time for action â orchestrating a Mis-Association attack
What just happened?
Have a go hero â forcing a client to connect to the Honeypot
The Caffe Latte attack
Time for action â conducting a Caffe Latte attack
What just happened?
Have a go hero â practise makes perfect!
Deauthentication and disassociation attacks
Time for action â deauthenticating the ...