My Account Log in

3 options

Kali Linux wireless penetration testing beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux / Vivek Ramachandran, Cameron Buchanan.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Ramachandran, Vivek, author.
Buchanan, Cameron, author.
Language:
English
Subjects (All):
Linux.
Computer security.
Computers--Access control.
Computers.
Physical Description:
1 online resource (214 p.)
Edition:
Second edition.
Other Title:
Master wireless testing techniques to survey and attack wireless networks with Kali Linux
Place of Publication:
Birmingham, England ; Mumbai, [India] : Packt Publishing, 2015.
Language Note:
English
System Details:
text file
Summary:
If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.
Contents:
Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Disclaimer; Table of Contents; Preface; Chapter 1: Wireless Lab Setup; Hardware requirements; Software requirements; Installing Kali; Time for action - installing Kali; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2: WLAN and its Inherent Insecurities; Revisiting WLAN frames
Time for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing management, control, and data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your adapter; The role of regulatory domains in wireless; Time for action - experimenting with your adapter; Summary; Chapter 3: Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters
Time for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4: WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrases; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks
Time for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5: Attacks on the WLAN Infrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access points; Denial of service attacks; Time for action - deauthentication DoS attacks; Evil twin and access point MAC spoofing; Time for action - evil twins and MAC spoofing; A rogue access point; Time for action - cracking WEP; Summary; Chapter 6: Attacking the Client; Honeypot and Mis-Association attacks
Time for action - orchestrating a Mis-Association attackThe Caffe Latte attack; Time for action - conducting a Caffe Latte attack; Deauthentication and disassociation attacks; Time for action - deauthenticating the client; The Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7: Advanced WLAN Attacks; A man-in-the-middle attack; Time for action - man-in-the-middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session hijacking over wireless
Time for action - session hijacking over wireless
Notes:
"Learn by doing : less theory, more results."
Includes index.
Description based on online resource; title from PDF title page (ebrary, viewed April 25, 2015).
ISBN:
9781783280421
1783280425
OCLC:
908199811

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account