BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
Master bleeding edge wireless testing techniques with BackTrack 5.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham [U.K.] :
Packt Pub.,
2011.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- BackTrack 5 Wireless Penetration Testing
- BackTrack 5 Wireless Penetration Testing
- Credits
- About the Reviewer
- www.PacktPub.com
- Support files, eBooks, discount offers, and more
- Why Subscribe
- Free Access for Packt account holders
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Time for action heading
- What just happened
- Pop quiz heading
- Have a go hero heading
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Wireless Lab Setup
- Hardware requirements
- Software requirements
- Installing BackTrack.
- Time for action installing BackTrackWhat just happened
- Have a go hero installing BackTrack on Virtual Box
- Setting up the access point
- Time for action configuring the access point
- What just happened
- Have a go hero configuring the access point to use WEP and WPA
- Setting up the wireless card
- Time for action configuring your wireless card
- What just happened
- Connecting to the access point
- Time for action configuring your wireless card
- What just happened
- Have a go hero establishing connection in WEP configuration
- Pop quiz understanding the basics
- Summary.
- 2. WLAN and Its Inherent InsecuritiesRevisiting WLAN frames
- Time for action creating a monitor mode interface
- What just happened
- Have a go hero creating multiple monitor mode interfaces
- Time for action sniffing wireless packets
- What just happened
- Have a go hero finding different devices
- Time for action viewing Management, Control, and Data frames
- What just happened
- Have a go hero playing with filters
- Time for action sniffing data packets for our network
- What just happened
- Have a go hero analyzing data packets
- Time for action packet injection
- What just happened.
- Have a go hero installing BackTrack on Virtual BoxImportant note on WLAN sniffing and injection
- Time for action experimenting with your Alfa card
- What just happened
- Have a go hero sniffing multiple channels
- Role of regulatory domains in wireless
- Time for action experimenting with your Alfa card
- What just happened
- Have a go hero exploring regulatory domains
- Pop quiz WLAN packet sniffing and injection
- Summary
- 3. Bypassing WLAN Authentication
- Hidden SSIDs
- Time for action uncovering hidden SSIDs
- What just happened
- Have a go hero selecting Deauthentication
- MAC filters.
- Time for action beating MAC filtersWhat just happened
- Open Authentication
- Time for action bypassing Open Authentication
- What just happened
- Shared Key Authentication
- Time for action bypassing Shared Authentication
- What just happened
- Have a go hero filling up the access point's tables
- Pop quiz WLAN authentication
- Summary
- 4. WLAN Encryption Flaws
- WLAN encryption
- WEP encryption
- Time for action cracking WEP
- What just happened
- Have a go hero fake authentication with WEP cracking
- WPA/WPA2
- Time for action cracking WPA-PSK weak passphrase
- What just happened.
- Have a go hero trying WPA-PSK cracking with Cowpatty.