Cargando…

Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals /

This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Johns, A. (Aaron) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing, 2015.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_ocn903967071
003 OCoLC
005 20231027140348.0
006 m o d
007 cr cn|||||||||
008 150209t20152015enk o 001 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d N$T  |d COO  |d OCLCF  |d TEFOD  |d OCLCQ  |d YDXCP  |d CCO  |d MERUC  |d OCLCQ  |d LOA  |d OCLCQ  |d COCUF  |d K6U  |d CNNOR  |d STF  |d FVL  |d AGLDB  |d IGB  |d VT2  |d U3W  |d D6H  |d OCLCQ  |d VTS  |d NLE  |d INT  |d AU@  |d UKMGB  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d MERER  |d OCLCQ  |d UKAHL  |d OCLCO  |d QGK  |d OCLCQ  |d UPM  |d OCLCQ 
016 7 |a 018005280  |2 Uk 
019 |a 948892085  |a 961620722  |a 1259080461 
020 |a 9781782163190  |q (electronic bk.) 
020 |a 1782163190  |q (electronic bk.) 
020 |z 1782163182 
020 |z 9781782163183 
029 1 |a CHNEW  |b 000707241 
029 1 |a DEBSZ  |b 493158774 
029 1 |a UKMGB  |b 018005280 
035 |a (OCoLC)903967071  |z (OCoLC)948892085  |z (OCoLC)961620722  |z (OCoLC)1259080461 
037 |a 6093F580-F494-4F56-83AF-72639E6D2EBC  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b .J646 2015eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
049 |a UAMI 
100 1 |a Johns, A.  |q (Aaron),  |e author. 
245 1 0 |a Mastering wireless penetration testing for highly secured environments :  |b scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals /  |c Aaron Johns. 
264 1 |a Birmingham, England :  |b Packt Publishing,  |c 2015. 
264 4 |c ©2015 
300 |a 1 online resource (220 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community Experience Distilled 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ebrary, viewed February 6, 2015). 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Preparing for an Effective Wireless Penetration Test; Benefits; Value and loyalty; Expertise and skills; Who should read this book; What is Kali Linux?; Downloading Kali Linux; Installing Kali Linux in VMware Player; Updating Kali Linux; Wireless penetration tools; HashCalc; NetStumbler; inSSIDer; Kismet; WEPCrack; Aircrack-ng; Metasploit; Nessus; Armitage; Nmap; Wireshark; Scapy; Wireless terminologies; Why can't I use my built-in Wi-Fi chipset in my laptop? 
505 8 |a How can I determine whether my Wi-Fi chipset can be used?Wireless hardware; Wireless models; Three wireless models; Alfa AWUS036NHR; Alfa AWUS036H; TL-WN722N; Summary; Chapter 2: Wireless Security Testing; Wireless penetration testing methodology; Why should I follow this methodology?; Wireless attacks and penetration steps; Wireless attacking techniques and methods; Access control attacks; War driving; Rogue access points; Ad hoc associations; MAC spoofing; 802.11 RADIUS cracking; Confidential attacks; Eavesdropping; WEP key cracking; Evil twin AP; AP Phishing; The man-in-the-middle attack. 
505 8 |a Credential attacksCredential harvester; Phishing; Authentication attacks; Shared key guessing; PSK cracking; Sniffing application credentials; Cracking domain accounts; VPN login cracking; 802.11 identify theft; 802.11 password guessing; 802.11 LEAP cracking; 802.11 EAP downgrade attack; Issues with wireless networks; Prevention; Summary; Chapter 3: Footprinting and Reconnaissance; What is footprinting and reconnaissance?; Wireless network discovery; Nmap; Nmap commands; Zenmap; Wireless scanning; Passive scanning; Active scanning; How scanning works; Sniffing wireless networks. 
505 8 |a The Wireshark applicationEttercap; dsniff; Identifying your targets; Protecting/preventing yourself from attacks; Summary; Chapter 4: Penetrating Wireless Networks; Planning an attack; What you'll need for the attack; The plan for attacking wireless networks; Wireless password cracking; WEP encryption; Cracking WEP encryption; Cracking WPA and WPA2 encryption; What is Reaver?; How does Reaver work?; Protecting yourself against Reaver; WPA/WPA2 cracking results; Spoofing your MAC address; Protect yourself from wireless attacks; Summary; Chapter 5: Gaining Access to the Network. 
505 8 |a Identifying hostsNetwork mapping tools; Determining the network size; Determining network size in Kali Linux; Detecting vulnerable hosts; Preventing against threats; Prevention of identifying hosts; Preventing others from determining your network size; Protection of vulnerable hosts; Summary; Chapter 6: Vulnerability Assessment; Planning an assessment; Components of a vulnerability assessment plan; Planning process of a vulnerability assessment; Setting up a vulnerability scanner; Downloading Nessus; Installing Nessus; Running the vulnerability scanner; Generating reports. 
520 |a This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking. 
546 |a English. 
590 |a Knovel  |b ACADEMIC - Software Engineering 
590 |a Knovel  |b ACADEMIC - Computer Hardware Engineering 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computers  |x Access control. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
776 0 8 |i Print version:  |a Johns, Aaron.  |t Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals.  |d Birmingham, England : Packt Publishing, ©2015  |h v, 201 pages  |k Community experience distilled.  |z 9781782163183 
830 0 |a Community experience distilled. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpMWPTHSE1/toc  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28174087 
938 |a ebrary  |b EBRY  |n ebr11011954 
938 |a EBSCOhost  |b EBSC  |n 943558 
938 |a YBP Library Services  |b YANK  |n 12260102 
994 |a 92  |b IZTAP