Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Wireless Penetration Testing Essentials

Buy

Plan and execute penetration tests on wireless networks with the Kali Linux distribution

About This Book

  • Learn the fundamentals of wireless LAN security and penetration testing
  • Discover and attack wireless networks using specialized Kali Linux tools
  • A step-by-step, practical guide to wireless penetration testing with hands-on examples

Who This Book Is For

This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.

What You Will Learn

  • Explore the penetration testing methodology and its various phases
  • Install Kali Linux on your laptop and configure the wireless adapter
  • Scan and enumerate wireless LANs and point out their vulnerabilities
  • Understand the WEP security protocol and the techniques to crack the authentication keys and break it
  • Become proficient with the WPA/WPA2 protocol and use Kali Linux tools to attack it
  • Attack the access points and take control of the wireless network
  • Launch advanced attacks against clients
  • Produce stunning and effective reports

In Detail

Kali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools.

This book introduces you to wireless penetration testing and describes how to conduct its various phases. After showing you how to install Kali Linux on your laptop, you will verify the requirements of the wireless adapter and configure it. Next, the book covers the wireless LAN reconnaissance phase, explains the WEP and WPA/WPA2 security protocols and demonstrates practical attacks against them using the tools provided in Kali Linux, Aircrack-ng in particular. You will then discover the advanced and latest attacks targeting access points and wireless clients and learn how to create a professionally written and effective report.

(HTML tags aren't allowed.)

Software Engineering and Development
Software Engineering and Development

Software engineering is one of the most knowledge intensive jobs. Thus, having a good knowledge management (KM) strategy in these organisations is very important. This book examines software processes from a knowledge perspective flow, in order to identify the particular knowledge needs of such processes to then be in a better position for...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Expert .NET Micro Framework
Expert .NET Micro Framework
The Microsoft .NET Micro Framework is a small and efficient .NET runtime environment used to run managed code on devices that are too small and resource constrained for Windows CE and the Compact Framework.

Expert .NET Micro Framework will teach you everything you need to know in order to use the .NET Micro Framework to create effective...


Project Leadership (The Project Management Essential Library)
Project Leadership (The Project Management Essential Library)
Product Leadership traces the development of project leadership as fundamental to completing projects effectively, delineates the leadership tasks that must be accomplished at each stage of the project’s life, and helps the reader develop wisdom in making decisions both by learning the ramifications of certain decisions and by seeing...
CAPM® in Depth: Certified Associate in Project Management Study Guide for the CAPM® Exam
CAPM® in Depth: Certified Associate in Project Management Study Guide for the CAPM® Exam
Use this study guide to prepare for the Certified Associate in Project Management (CAPM) exam, based on PMBOK's sixth edition, administered by the Project Management Institute (PMI).

The revised and updated second edition of the best-selling CAPM in Depth has a laser-sharp focus on the exam...
Practical Criminal Investigations in Correctional Facilities
Practical Criminal Investigations in Correctional Facilities
The felonious activities of confined inmates reach out into society every day. These inmates run lucrative drug operations, commit fraud, hire contract murders, and commit a multitude of criminal offenses from inside the walls of our prisons. Practical Criminal Investigations in Correctional Facilities gives sound advice to both the long-time...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy