Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Kali Linux Wireless Pentesting

You're reading from   Mastering Kali Linux Wireless Pentesting Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux

Arrow left icon
Product type Paperback
Published in Feb 2016
Publisher
ISBN-13 9781785285561
Length 310 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Jilumudi Raghu Ram Jilumudi Raghu Ram
Author Profile Icon Jilumudi Raghu Ram
Jilumudi Raghu Ram
Brian Sak Brian Sak
Author Profile Icon Brian Sak
Brian Sak
Arrow right icon
View More author details
Toc

Table of Contents (11) Chapters Close

Preface 1. Wireless Penetration Testing Fundamentals FREE CHAPTER 2. Wireless Network Scanning 3. Exploiting Wireless Devices 4. Wireless Cracking 5. Man-in-the-Middle Attacks 6. Man-in-the-Middle Attacks Using Evil Twin Access Points 7. Advanced Wireless Sniffing 8. Denial of Service Attacks 9. Wireless Pentesting from Non-Traditional Platforms Index

What this book covers

Chapter 1, Wireless Penetration Testing Fundamentals, introduces you to the hardware, software, and terminology associated with wireless penetration tests. It guides you through deploying Kali and verifying your wireless hardware required to conduct a successful wireless assessment.

Chapter 2, Wireless Network Scanning, covers the steps that are to be performed in order to discover, identify, and catalog wireless networks and clients that are in the scope of your penetration test.

Chapter 3, Exploiting Wireless Devices, describes weaknesses that may be present in the wireless equipment itself and tools and techniques you can use to exploit these weaknesses.

Chapter 4, Wireless Cracking, digs into the interception of wireless key exchanges and authentication between the clients and the infrastructure. It also shows you practical techniques to crack these various security mechanisms and expose the encrypted data transmissions.

Chapter 5, Man-in-the Middle Attacks, explains and demonstrates ways to extract sensitive information from the clients who are using the wireless infrastructure by enabling you to intercept their traffic and manipulate critical network resources.

Chapter 6, Man-in-the Middle Attacks Using Evil Twin Access Points, expands on the previous chapter by showing you techniques to set up a parallel wireless infrastructure to emulate the production network. This enables additional attacks against the clients utilizing the wireless network.

Chapter 7, Advanced Wireless Sniffing, covers the use of traffic captures and decryption as a means to extract sensitive information from the data that is traversing the wireless network. Tools and techniques used to collect and analyze the data are provided.

Chapter 8, Denial of Service Attacks, discusses the use of targeted or broad disruptions in the performance or availability of the wireless network as an element of a wireless assessment.

Chapter 9, Wireless Pen-Testing from Non-Traditional Platforms, expands upon the previous chapters and introduces additional hardware and software platforms that can be used during a wireless assessment, including Raspberry Pi and Android devices.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime