Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Kali Linux Wireless Penetration Testing Beginner's Guide
Master wireless testing techniques to survey and attack wireless networks with Kali Linux
Taschenbuch von Cameron Buchanan (u. a.)
Sprache: Englisch

60,80 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung
Master wireless testing techniques to survey and attack wireless networks with Kali Linux
Key Features

Learn wireless penetration testing with Kali Linux; Backtrack's evolution

Detect hidden wireless networks and discover their names

Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing

Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

What you will learn

Create a wireless lab for your experiments

Sniff out wireless packets and hidden networks

Capture and crack WPA-2 keys

Discover hidden SSIDs

Explore the ins and outs of wireless technologies

Sniff probe requests and track users through SSID history

Attack radius authentication systems

Sniff wireless traffic and collect interesting data

Decrypt encrypted traffic with stolen keys
Master wireless testing techniques to survey and attack wireless networks with Kali Linux
Key Features

Learn wireless penetration testing with Kali Linux; Backtrack's evolution

Detect hidden wireless networks and discover their names

Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing

Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

What you will learn

Create a wireless lab for your experiments

Sniff out wireless packets and hidden networks

Capture and crack WPA-2 keys

Discover hidden SSIDs

Explore the ins and outs of wireless technologies

Sniff probe requests and track users through SSID history

Attack radius authentication systems

Sniff wireless traffic and collect interesting data

Decrypt encrypted traffic with stolen keys
Über den Autor
Vivek Ramachandran has been working on Wi-Fi security since 2003. He discovered the Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007 at DEF CON. In 2011, he was the first to demonstrate how malware could use Wi-Fi to create backdoors, worms, and even botnets. Earlier, Vivek was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches, and he was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He is best known in the hacker community as the founder of [...], where he routinely posts videos on Wi-Fi security, assembly language, exploitation techniques, and so on. [...] receives over 100,000 unique visitors a month. Vivek's work on wireless security has been quoted in BBC Online, InfoWorld, MacWorld, The Register, IT World Canada, and so on. This year, he will speak or train at a number of security conferences, including Blackhat, DEF CON, Hacktivity, 44con, HITB-ML, BruCON Derbycon, Hashdays, SecurityZone, and SecurityByte.
Details
Erscheinungsjahr: 2015
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
ISBN-13: 9781783280414
ISBN-10: 1783280417
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Buchanan, Cameron
Ramachandran, Vivek
Hersteller: Packt Publishing
Verantwortliche Person für die EU: Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de
Maße: 235 x 191 x 12 mm
Von/Mit: Cameron Buchanan (u. a.)
Erscheinungsdatum: 30.03.2015
Gewicht: 0,41 kg
Artikel-ID: 107896709
Über den Autor
Vivek Ramachandran has been working on Wi-Fi security since 2003. He discovered the Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007 at DEF CON. In 2011, he was the first to demonstrate how malware could use Wi-Fi to create backdoors, worms, and even botnets. Earlier, Vivek was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches, and he was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He is best known in the hacker community as the founder of [...], where he routinely posts videos on Wi-Fi security, assembly language, exploitation techniques, and so on. [...] receives over 100,000 unique visitors a month. Vivek's work on wireless security has been quoted in BBC Online, InfoWorld, MacWorld, The Register, IT World Canada, and so on. This year, he will speak or train at a number of security conferences, including Blackhat, DEF CON, Hacktivity, 44con, HITB-ML, BruCON Derbycon, Hashdays, SecurityZone, and SecurityByte.
Details
Erscheinungsjahr: 2015
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
ISBN-13: 9781783280414
ISBN-10: 1783280417
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Buchanan, Cameron
Ramachandran, Vivek
Hersteller: Packt Publishing
Verantwortliche Person für die EU: Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de
Maße: 235 x 191 x 12 mm
Von/Mit: Cameron Buchanan (u. a.)
Erscheinungsdatum: 30.03.2015
Gewicht: 0,41 kg
Artikel-ID: 107896709
Sicherheitshinweis