Limit this search to....

Kali Linux Wireless Penetration Testing Beginner's Guide: Master wireless testing techniques to survey and attack wireless networks with Kali Linux
Contributor(s): Buchanan, Cameron (Author), Ramachandran, Vivek (Author)
ISBN: 1783280417     ISBN-13: 9781783280414
Publisher: Packt Publishing
OUR PRICE:   $46.54  
Product Type: Paperback - Other Formats
Published: March 2015
Qty:
Additional Information
BISAC Categories:
- Computers | Security - General
- Computers | Software Development & Engineering - Quality Assurance & Testing
Physical Information: 0.45" H x 7.5" W x 9.25" (0.83 lbs) 214 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

Master wireless testing techniques to survey and attack wireless networks with Kali Linux

Key Features

  • Learn wireless penetration testing with Kali Linux; Backtrack's evolution
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

What you will learn

  • Create a wireless lab for your experiments
  • Sniff out wireless packets and hidden networks
  • Capture and crack WPA-2 keys
  • Discover hidden SSIDs
  • Explore the ins and outs of wireless technologies
  • Sniff probe requests and track users through SSID history
  • Attack radius authentication systems
  • Sniff wireless traffic and collect interesting data
  • Decrypt encrypted traffic with stolen keys