|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn944921872 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
160316s2016 enka o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d KSU
|d COO
|d DEBBG
|d Z5A
|d YDX
|d YDXCP
|d IDEBK
|d DEBSZ
|d OCLCQ
|d UOK
|d CEF
|d N$T
|d AGLDB
|d IGB
|d UKAHL
|d RDF
|d UKMGB
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBC1J1661
|2 bnb
|
016 |
7 |
|
|a 018010455
|2 Uk
|
019 |
|
|
|a 942386980
|a 942843804
|a 960029048
|
020 |
|
|
|a 9781785282850
|q (electronic bk.)
|
020 |
|
|
|a 1785282859
|q (electronic bk.)
|
020 |
|
|
|z 9781785285561
|
020 |
|
|
|z 1785285564
|
029 |
1 |
|
|a DEBBG
|b BV043969012
|
029 |
1 |
|
|a DEBSZ
|b 485795256
|
029 |
1 |
|
|a GBVCP
|b 882753622
|
029 |
1 |
|
|a DEBSZ
|b 473885700
|
029 |
1 |
|
|a UKMGB
|b 018010455
|
035 |
|
|
|a (OCoLC)944921872
|z (OCoLC)942386980
|z (OCoLC)942843804
|z (OCoLC)960029048
|
037 |
|
|
|a CL0500000722
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
1 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sak, Brian,
|e author.
|
245 |
1 |
0 |
|a Mastering Kali Linux wireless pentesting :
|b test your wireless network's security and master advanced wireless penetration techniques using Kali Linux /
|c Brian Sak, Jilumudi Raghu Ram.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2016.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Community experience distilled
|
588 |
|
|
|a Description based on online resource; title from cover (viewed March 15, 2016).
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux.
|
505 |
0 |
|
|a Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Wireless Penetration Testing Fundamentals ; Wireless communication; Wireless standards; The 2.4 GHz spectrum; The 5 GHz spectrum; Choosing the right equipment; Supported wireless modes; Wireless adapters; Ralink RT3070; Atheros AR9271; Ralink RT3572; Antennas; Omnidirectional antennas; Patch antennas; Yagi antennas; Kali Linux for the Wireless Pentester; Downloading Virtual Box; Installing Virtual Box; Kali Linux deployment; Mapping the wireless adapter into Kali
|
505 |
8 |
|
|a Cross-Site Request ForgeryCVE-2014-5437; CVE-2014-8654; CVE-2013-2645; Remote code execution; CVE-2014-9134; Command injection; CVE-2008-1331; Denial of Service; OSVDB-102605; CVE-2009-3836; Information disclosure; CVE-2014-6621; CVE-2014-6622; CVE-2015-0554; Attacking the services; Attacking Telnet; Attacking SSH; Attacking SNMP; CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure; CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure; Attacking SNMP; Attacking UPnP; Discovery; Description; Control; UPnP attacks; CVE-2011-4500; CVE-2011-4499; CVE-2011-4501
|
505 |
8 |
|
|a CVE-2012-5960Checks on misconfiguration; Summary; Chapter 4: Wireless Cracking ; Overview of different wireless security protocols; Cracking WPA; WPA Personal; Cracking WPA2; Generating rainbow tables; Generating rainbow tables using genpmk; Generating rainbow tables using airolib-ng; Cracking WPS; Cracking 802.1x using hostapd; Summary; Chapter 5: Man-in-the-Middle Attacks ; MAC address Spoofing/ARP poisoning; Rogue DHCP server; Name resolution spoofing; DNS spoofing; Configuring Ettercap for DNS spoofing; NBNS spoofing; Summary
|
505 |
8 |
|
|a Chapter 6: Man-in-the-Middle Attacks Using Evil Twin Access Points Creating virtual access points with Hostapd; Creating virtual access points with airbase-ng; Session hijacking using Tamper Data; An example of session hijacking; Performing session hijacking using Tamper Data; Credential harvesting; Using Ettercap to spoof DNS; Hosting your fake web page; Web-based malware; Creating malicious payload using msfpayload; Hosting the malicious payload on SET; SSL stripping attack; Setting up SSLstrip; Browser AutoPwn; Setting up Metasploit's Browser Autopwn attack; Summary
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux.
|2 fast
|0 (OCoLC)fst01914587
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS / Security / Networking.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
700 |
1 |
|
|a Ram, Jilumudi Raghu,
|e author.
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781785285561/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH30413047
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis34092116
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12866637
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1191128
|
994 |
|
|
|a 92
|b IZTAP
|