Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux /
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take y...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2016.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | EBSCO_ocn944921872 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 160316s2016 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d KSU |d COO |d DEBBG |d Z5A |d YDX |d YDXCP |d IDEBK |d DEBSZ |d OCLCQ |d UOK |d CEF |d N$T |d AGLDB |d IGB |d UKAHL |d RDF |d UKMGB |d OCLCO |d OCLCQ | ||
015 | |a GBC1J1661 |2 bnb | ||
016 | 7 | |a 018010455 |2 Uk | |
019 | |a 942386980 |a 942843804 |a 960029048 | ||
020 | |a 9781785282850 |q (electronic bk.) | ||
020 | |a 1785282859 |q (electronic bk.) | ||
020 | |z 9781785285561 | ||
020 | |z 1785285564 | ||
029 | 1 | |a DEBBG |b BV043969012 | |
029 | 1 | |a DEBSZ |b 485795256 | |
029 | 1 | |a GBVCP |b 882753622 | |
029 | 1 | |a DEBSZ |b 473885700 | |
029 | 1 | |a UKMGB |b 018010455 | |
035 | |a (OCoLC)944921872 |z (OCoLC)942386980 |z (OCoLC)942843804 |z (OCoLC)960029048 | ||
037 | |a CL0500000722 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
082 | 1 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Sak, Brian, |e author. | |
245 | 1 | 0 | |a Mastering Kali Linux wireless pentesting : |b test your wireless network's security and master advanced wireless penetration techniques using Kali Linux / |c Brian Sak, Jilumudi Raghu Ram. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2016. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Community experience distilled | |
588 | |a Description based on online resource; title from cover (viewed March 15, 2016). | ||
500 | |a Includes index. | ||
520 | |a Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux. | ||
505 | 0 | |a Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Wireless Penetration Testing Fundamentals ; Wireless communication; Wireless standards; The 2.4 GHz spectrum; The 5 GHz spectrum; Choosing the right equipment; Supported wireless modes; Wireless adapters; Ralink RT3070; Atheros AR9271; Ralink RT3572; Antennas; Omnidirectional antennas; Patch antennas; Yagi antennas; Kali Linux for the Wireless Pentester; Downloading Virtual Box; Installing Virtual Box; Kali Linux deployment; Mapping the wireless adapter into Kali | |
505 | 8 | |a Cross-Site Request ForgeryCVE-2014-5437; CVE-2014-8654; CVE-2013-2645; Remote code execution; CVE-2014-9134; Command injection; CVE-2008-1331; Denial of Service; OSVDB-102605; CVE-2009-3836; Information disclosure; CVE-2014-6621; CVE-2014-6622; CVE-2015-0554; Attacking the services; Attacking Telnet; Attacking SSH; Attacking SNMP; CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure; CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure; Attacking SNMP; Attacking UPnP; Discovery; Description; Control; UPnP attacks; CVE-2011-4500; CVE-2011-4499; CVE-2011-4501 | |
505 | 8 | |a CVE-2012-5960Checks on misconfiguration; Summary; Chapter 4: Wireless Cracking ; Overview of different wireless security protocols; Cracking WPA; WPA Personal; Cracking WPA2; Generating rainbow tables; Generating rainbow tables using genpmk; Generating rainbow tables using airolib-ng; Cracking WPS; Cracking 802.1x using hostapd; Summary; Chapter 5: Man-in-the-Middle Attacks ; MAC address Spoofing/ARP poisoning; Rogue DHCP server; Name resolution spoofing; DNS spoofing; Configuring Ettercap for DNS spoofing; NBNS spoofing; Summary | |
505 | 8 | |a Chapter 6: Man-in-the-Middle Attacks Using Evil Twin Access Points Creating virtual access points with Hostapd; Creating virtual access points with airbase-ng; Session hijacking using Tamper Data; An example of session hijacking; Performing session hijacking using Tamper Data; Credential harvesting; Using Ettercap to spoof DNS; Hosting your fake web page; Web-based malware; Creating malicious payload using msfpayload; Hosting the malicious payload on SET; SSL stripping attack; Setting up SSLstrip; Browser AutoPwn; Setting up Metasploit's Browser Autopwn attack; Summary | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
630 | 0 | 0 | |a Kali Linux. |
630 | 0 | 7 | |a Kali Linux. |2 fast |0 (OCoLC)fst01914587 |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS / Security / Networking. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Penetration testing (Computer security) |2 fast |0 (OCoLC)fst01789566 | |
700 | 1 | |a Ram, Jilumudi Raghu, |e author. | |
830 | 0 | |a Community experience distilled. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781785285561/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1191128 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH30413047 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis34092116 | ||
938 | |a YBP Library Services |b YANK |n 12866637 | ||
938 | |a EBSCOhost |b EBSC |n 1191128 | ||
994 | |a 92 |b IZTAP |