Cargando…

Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution /

This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic network...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Alamanni, Marco (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2015.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn918862369
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150817s2015 enka ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d IDEBK  |d EBLCP  |d DEBSZ  |d COO  |d OCLCF  |d TEFOD  |d YDXCP  |d DEBBG  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCO  |d N$T  |d CEF  |d NLE  |d UKMGB  |d OCLCQ  |d WYU  |d OCLCO  |d UAB  |d AU@  |d UKAHL  |d OCLCQ  |d OCLCO  |d HS0  |d OCLCO  |d OCLCQ  |d OCLCO 
016 7 |a 018010496  |2 Uk 
019 |a 916530542  |a 923518056 
020 |a 9781785284816  |q (electronic bk.) 
020 |a 1785284819  |q (electronic bk.) 
020 |z 9781785280856 
020 |z 1785280856 
029 1 |a AU@  |b 000056112820 
029 1 |a DEBBG  |b BV043020103 
029 1 |a DEBBG  |b BV043622449 
029 1 |a DEBSZ  |b 445087943 
029 1 |a DEBSZ  |b 455696705 
029 1 |a GBVCP  |b 882743694 
029 1 |a UKMGB  |b 018010496 
035 |a (OCoLC)918862369  |z (OCoLC)916530542  |z (OCoLC)923518056 
037 |a CL0500000628  |b Safari Books Online 
037 |a 421BBC14-EEC9-4A92-8D67-7EA39F77F1FC  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.109234690 
049 |a UAMI 
100 1 |a Alamanni, Marco,  |e author. 
245 1 0 |a Kali Linux wireless penetration testing essentials :  |b plan and execute penetration tests on wireless networks with the Kali Linux distribution /  |c Marco Alamanni. 
246 3 0 |a Plan and execute penetration tests on wireless networks with the Kali Linux distribution 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2015. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from cover (Safari, viewed August 12, 2015). 
504 |a Includes bibliographical references and index. 
505 0 |a ""Cover""; ""Copyright""; ""Credits""; ""Disclaimer""; ""About the Author""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Introduction to Wireless Penetration Testing""; ""Phases of penetration testing""; ""The planning phase""; ""The discovery phase""; ""The attack phase""; ""The reporting phase""; ""The executive summary""; ""The technical report""; ""Summary""; ""Chapter 2: Setting Up Your Machine with Kali Linux""; ""Introduction to the Kali Linux distribution""; ""Installing Kali Linux""; ""Installation on a virtual machine"" 
505 8 |a ""Creating a new virtual machine""""Installation steps""; ""Wireless adapter setup and configuration""; ""Requirements of the wireless adapter""; ""Wireless card configuration""; ""Testing the adapter for wireless penetration testing""; ""Troubleshooting""; ""Summary""; ""Chapter 3: WLAN Reconnaissance""; ""Introduction to 802.11 standard and wireless LAN""; ""802.11 frames, types, and subtypes""; ""Infrastructure mode and wireless access points""; ""Wireless security""; ""Wireless LAN scanning""; ""Configuring the wireless adapter in monitor mode""; ""Wireless scanning with airodump-ng"" 
505 8 |a ""Wireless scanning with Kismet""""Summary""; ""Chapter 4: WEP Cracking""; ""An introduction to WEP""; ""Attacks against WEP""; ""WEP cracking with Aircrack-ng""; ""Cracking the WEP key with connected clients""; ""Cracking the WEP key without connected clients""; ""The Fragmentation and ChopChop attacks""; ""Forging and injecting ARP request frames""; ""WEP cracking with automated tools""; ""WEP cracking with Fern WiFi Cracker""; ""Summary""; ""Chapter 5: WPA/WPA2 Cracking""; ""An introduction to WPA/WPA2""; ""Attacking the WPA""; ""WPA cracking with Aircrack-ng"" 
505 8 |a ""WPA cracking with Cowpatty""""WPA cracking with the GPU""; ""Pyrit""; ""oclHashcat""; ""WPA cracking with automated tools""; ""Wifite""; ""Summary""; ""Chapter 6: Attacking Access Points and the Infrastructure""; ""Attacks against Wi-Fi Protected Setup""; ""Reaver""; ""Attacking WPA-Enterprise""; ""Setting up a WPA-Enterprise network""; ""Attacks targeting EAP""; ""Attacking PEAP""; ""Denial of Service attacks""; ""DoS attacks with MDK3""; ""Rogue access points""; ""Attacking AP authentication credentials""; ""Summary""; ""Chapter 7: Wireless Client Attacks"" 
505 8 |a ""Honeypot access points and Evil Twin attacks""""The Evil Twin attack in practice""; ""Man-in-the-middle attacks""; ""Ghost phisher""; ""The Caffe Latte attack""; ""The Hirte attack""; ""Cracking WPA keys without the AP""; ""Summary""; ""Chapter 8: Reporting and Conclusions""; ""The four stages of report writing""; ""Report planning""; ""Information collection""; ""Documentation tools""; ""Writing the first draft""; ""Review and finalization""; ""The report format""; ""The executive summary""; ""The technical report""; ""Summary""; ""Conclusions""; ""Appendix: References""; ""Index"" 
520 |a This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Linux. 
630 0 7 |a Linux  |2 fast 
650 0 |a Penetration testing (Computer security) 
650 0 |a Wireless Internet. 
650 6 |a Tests d'intrusion. 
650 6 |a Internet mobile. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Wireless Internet  |2 fast 
650 7 |a Computer Science.  |2 hilcc 
650 7 |a Engineering & Applied Sciences.  |2 hilcc 
776 0 8 |i Print version:  |a Alamanni, Marco.  |t Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution.  |d Birmingham, England : Packt Publishing, ©2015  |h ix, 140 pages  |k Community experience distilled.  |z 9781785280856 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781785280856/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29022136 
938 |a EBL - Ebook Library  |b EBLB  |n EBL2120330 
938 |a EBSCOhost  |b EBSC  |n 1046856 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis32260736 
938 |a YBP Library Services  |b YANK  |n 12552585 
994 |a 92  |b IZTAP