Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Kali Linux Wireless Penetration Testing Cookbook

You're reading from   Kali Linux Wireless Penetration Testing Cookbook Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Arrow left icon
Product type Paperback
Published in Dec 2017
Publisher
ISBN-13 9781783554089
Length 216 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Sean-Philip Oriyano Sean-Philip Oriyano
Author Profile Icon Sean-Philip Oriyano
Sean-Philip Oriyano
Arrow right icon
View More author details
Toc

Introduction

In today's world, one of the most common ways to share information is through the use of wireless communications. Wi-Fi is used in many locations, including the home, the workplace, airports, coffee shops, retail shops, and many other areas too numerous to name.

With the popularity of this type of communication, it is a forgone conclusion that there is a lot of valuable information that is traversing these networks. It is due to this information and the inherent weaknesses in these networks that they are common targets for those wishing to steal access, or information, or both.

In this book, our intention is twofold, with one objective being to introduce you to the tools in Kali Linux designed to audit wireless network, and the other to show some of the different attacks that are possible. This approach will serve to give you not only information on the attacks and how they work, but also give you valuable insight into reducing the likelihood or effectiveness of these attacks.

Getting started with Kali

Kali Linux is intended for both those who will perform pentesting and forensics; however in this book, we will be focusing on the former more than the latter. In fact, on the topic of pentesting, we will be focusing on using only those tools used to test and breach the security of wireless networks or devices.

In order to get the most out of this book and understand how it is used to penetrate wireless networks, you should have some basic skills in place to make things easier. It is expected that if you are going to start this journey into auditing wireless networks you should, at the very least, have the following skills:

  • Good understanding of the TCP/IP protocol and IPv4
  • Knowledge of the Open Systems Interconnect (OSI) model
  • Understanding of network frame types (that is, IEEE 802.3, 802.11, and so on)
  • Knowledge of radio frequencies and technologies is helpful, but optional
  • Experience setting up and working with wireless devices and networks
  • Hands-on experience working with Kali Linux is helpful, but we will fill in the gaps in your knowledge along the way
  • Experience working with virtualization is optional if you intend to make use of it for hosting your setup
  • Experience troubleshooting networks
  • Comfort using the command line

Again, of these last few points, lack of them will not hurt you, but possessing them will go a long way in helping you both in this book and in your pentesting career.

You have been reading a chapter from
Kali Linux Wireless Penetration Testing Cookbook
Published in: Dec 2017
Publisher:
ISBN-13: 9781783554089
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £16.99/month. Cancel anytime