Cargando…

Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security /

More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless net...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oriyano, Sean-Philip (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2017.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1020288718
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180124s2017 enka o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d IDEBK  |d OCLCF  |d N$T  |d TOH  |d CEF  |d KSU  |d DEBBG  |d TEFOD  |d G3B  |d LVT  |d S9I  |d UAB  |d OCLCQ  |d OCLCO  |d NZAUC  |d OCLCQ  |d OCLCO 
020 |a 9781783988440  |q (electronic bk.) 
020 |a 1783988444  |q (electronic bk.) 
020 |a 1783554088 
020 |a 9781783554089 
020 |z 9781783554089 
029 1 |a GBVCP  |b 1014938384 
035 |a (OCoLC)1020288718 
037 |a CL0500000932  |b Safari Books Online 
037 |a F9880A1E-1359-4423-916A-B124DCB9155F  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Oriyano, Sean-Philip,  |e author. 
245 1 0 |a Kali Linux wireless penetration testing cookbook :  |b identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security /  |c Sean-Philip Oriyano. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2017. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Online resource; title from title page (Safari, viewed January 19, 2018). 
505 0 |a Cover -- Title Page -- Copyright -- Credits -- Disclaimer -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Kali Linux and Wireless Networking -- Introduction -- Getting started with Kali -- Installing Kali Linux -- Getting ready -- How to do it ... -- Virtualized versus physical -- Pre-installation checklist -- Choosing an installation option -- Hard drive selection -- Network cards and wireless -- Installing Kali Linux on a PC -- Getting ready -- How to do it ... -- Installing Kali in a virtual environment -- Getting ready -- How to do it ... -- Updating Kali Linux -- How to do it ... -- Preparing for wireless pentesting -- How to do it ... -- There's more ... -- Bluetooth adapters -- Chapter 2: Attacking Access Controls -- Introduction -- Types of access control attacks -- Working with war driving -- Getting ready -- How to do it ... -- Mapping access points and increasing accuracy -- Getting ready -- How to do it ... -- Creating a rogue access point -- Getting ready -- How to do it ... -- Evading MAC filtering with MAC spoofing -- Getting ready -- How to do it ... -- Identifying promiscuous clients -- Getting ready -- How to do it ... -- Chapter 3: Attacking Integrity Controls -- Introduction -- Types of attack -- Sniffing on a wireless network -- How does sniffing work? -- Getting ready -- How to do it ... -- Working with monitor mode and packet injection -- Getting ready -- How to do it ... -- Performing a data replay -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- How to do it ... -- Phase one -- configuring monitor mode -- Phase two -- packet injection -- Phase three -- capturing IVs -- Phase four -- performing a fake authentication -- Phase five -- ARP replay mode -- Phase six -- obtaining the WEP key. 
505 8 |a Chapter 4: Attacking Confidentiality -- Introduction -- Types of attack -- Creating an evil twin -- Getting ready -- How to do it ... -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- create a new AP with the same SSID and MAC address -- Step four -- forcing a reconnect -- Step five -- power up -- Man-in-the-middle with wireless -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- airdump-ng and traffic capture -- Step four -- replay that traffic -- Step five -- crack that traffic -- Chapter 5: Attacking Availability -- Introduction -- Types of attack -- Executing a deauthentication flood -- Getting ready -- How to do it ... -- Detecting beacon frames -- Getting ready -- How to do it ... -- Spoofing beacon frames -- Getting ready -- How to do it ... -- Creating a beacon flood -- Getting ready -- ARP cache poisoning -- Getting ready -- Chapter 6: Authentication Attacks -- Attacks against authentication -- Types of attack -- WEP attacks -- Getting ready -- How to do it ... -- WPA and WPA2 attacks -- Getting ready -- How to do it ... -- Attacking WPS -- Getting ready -- How to do it ... -- Chapter 7: Bluetooth Attacks -- Introduction -- A brief history of Bluetooth -- A look at the technology -- Bluetooth in operation -- Bluetooth protocol stack -- Vulnerabilities in Bluetooth -- Selecting the Bluetooth hardware -- Types of attack -- Bluesmacking -- Getting ready -- How to do it ... -- Bluejacking -- Getting ready -- How to do it ... -- Bluesnarfing -- Getting ready -- How to do it ... -- Index. 
520 |a More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ... 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux  |2 fast 
650 0 |a Penetration testing (Computer security) 
650 0 |a Wireless Internet. 
650 6 |a Tests d'intrusion. 
650 6 |a Internet mobile. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Wireless Internet  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781783554089/?ar  |z Texto completo 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1662021  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 1662021 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis39290376 
994 |a 92  |b IZTAP