Cargando…

BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /

Master bleeding edge wireless testing techniques with BackTrack 5.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ramachandran, Vivek
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham [U.K.] : Packt Pub., 2011.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • BackTrack 5 Wireless Penetration Testing
  • BackTrack 5 Wireless Penetration Testing
  • Credits
  • About the Reviewer
  • www.PacktPub.com
  • Support files, eBooks, discount offers, and more
  • Why Subscribe
  • Free Access for Packt account holders
  • What this book covers
  • What you need for this book
  • Who this book is for
  • Conventions
  • Time for action heading
  • What just happened
  • Pop quiz heading
  • Have a go hero heading
  • Reader feedback
  • Customer support
  • Errata
  • Piracy
  • Questions
  • 1. Wireless Lab Setup
  • Hardware requirements
  • Software requirements
  • Installing BackTrack.
  • Time for action installing BackTrackWhat just happened
  • Have a go hero installing BackTrack on Virtual Box
  • Setting up the access point
  • Time for action configuring the access point
  • What just happened
  • Have a go hero configuring the access point to use WEP and WPA
  • Setting up the wireless card
  • Time for action configuring your wireless card
  • What just happened
  • Connecting to the access point
  • Time for action configuring your wireless card
  • What just happened
  • Have a go hero establishing connection in WEP configuration
  • Pop quiz understanding the basics
  • Summary.
  • 2. WLAN and Its Inherent InsecuritiesRevisiting WLAN frames
  • Time for action creating a monitor mode interface
  • What just happened
  • Have a go hero creating multiple monitor mode interfaces
  • Time for action sniffing wireless packets
  • What just happened
  • Have a go hero finding different devices
  • Time for action viewing Management, Control, and Data frames
  • What just happened
  • Have a go hero playing with filters
  • Time for action sniffing data packets for our network
  • What just happened
  • Have a go hero analyzing data packets
  • Time for action packet injection
  • What just happened.
  • Have a go hero installing BackTrack on Virtual BoxImportant note on WLAN sniffing and injection
  • Time for action experimenting with your Alfa card
  • What just happened
  • Have a go hero sniffing multiple channels
  • Role of regulatory domains in wireless
  • Time for action experimenting with your Alfa card
  • What just happened
  • Have a go hero exploring regulatory domains
  • Pop quiz WLAN packet sniffing and injection
  • Summary
  • 3. Bypassing WLAN Authentication
  • Hidden SSIDs
  • Time for action uncovering hidden SSIDs
  • What just happened
  • Have a go hero selecting Deauthentication
  • MAC filters.
  • Time for action beating MAC filtersWhat just happened
  • Open Authentication
  • Time for action bypassing Open Authentication
  • What just happened
  • Shared Key Authentication
  • Time for action bypassing Shared Authentication
  • What just happened
  • Have a go hero filling up the access point's tables
  • Pop quiz WLAN authentication
  • Summary
  • 4. WLAN Encryption Flaws
  • WLAN encryption
  • WEP encryption
  • Time for action cracking WEP
  • What just happened
  • Have a go hero fake authentication with WEP cracking
  • WPA/WPA2
  • Time for action cracking WPA-PSK weak passphrase
  • What just happened.
  • Have a go hero trying WPA-PSK cracking with Cowpatty.