Escucha y lee

Entra en un mundo infinito de historias

  • Vive la experiencia de leer y escuchar todo lo que quieras
  • Más de 650.000 títulos
  • Títulos en exclusiva y Storytel Originals
  • Primeros 14 días gratis, luego 8,99 €/mes
  • Cancela cuando quieras
Suscríbete ahora
Details page - Device banner - 894x1036

Kali Linux Wireless Penetration Testing Cookbook: Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Idioma
Inglés
Format
Categoría

No ficción

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes

About This Book • Expose wireless security threats through the eyes of an attacker,

• Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,

• Acquire and apply key wireless pentesting skills used by industry experts

Who This Book Is For

If you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected.

What You Will Learn • Deploy and configure a wireless cyber lab that resembles an enterprise production environment

• Install Kali Linux 2017.3 on your laptop and configure the wireless adapter

• Learn the fundamentals of commonly used wireless penetration testing techniques

• Scan and enumerate Wireless LANs and access points

• Use vulnerability scanning techniques to reveal flaws and weaknesses

• Attack Access Points to gain access to critical networks

In Detail

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux.

This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed.

By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.

Style and approach

The book will provide the foundation principles, techniques, and in-depth analysis to effectively master wireless penetration testing. It will aid you in understanding and mastering many of the most powerful and useful wireless testing techniques in the industry.

© 2017 Packt Publishing (ebook ): 9781783988440

Fecha de lanzamiento

ebook : 13 de diciembre de 2017

Etiquetas

    Otros también disfrutaron ...

    1. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    2. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    3. Cybersecurity For Dummies Joseph Steinberg
    4. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    5. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    6. HACKING: 3 BOOKS IN 1 Alex Wagner
    7. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    8. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    9. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    10. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
    11. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    12. Linux for Beginners: 37 Linux Commands you Must Know ATTILA KOVACS
    13. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    14. Tor and the Dark Art of Anonymity Lance Henderson
    15. Cyberdeterrence and Cyberwar Martin C. Libicki
    16. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    17. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    18. CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures HISTORY FOREVER
    19. The Art of Deception: Controlling the Human Element of Security William L. Simon
    20. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    21. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
    22. Blockchain For Dummies Tiana Laurence
    23. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
    24. The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Glen D. Singh
    25. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    26. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    27. Cloud Security For Dummies Ted Coombs
    28. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    29. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
    30. CompTIA Network+: 3 in 1- Beginner's Guide+ Tips and Tricks+ Simple and Effective Strategies to Learn About CompTIA Network+ Certification Walker Schmidt
    31. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    32. CompTIA A+ Certification Study Guide For 220-1101 Exam 2 Books In 1: Mobile Devices, Networking, Hardware, Virtualization, Cloud Computing And Troubleshooting Richie Miller
    33. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    34. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    35. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    36. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
    37. Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Gllen D. Singh
    38. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    39. Docker Essentials: Simplifying containerization : A Beginner's Guide Mike Wilson
    40. Mastering Palo Alto Networks - Second Edition: Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS Tom Piens aka 'reaper'
    41. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    42. CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Andrew Hutz
    43. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    44. Docker Unboxed: Mastering Modern Infrastructure with Container Technology Sophia Bell
    45. CCNA: 3 in 1- Beginner's Guide+ Tips on Taking the Exam+ Simple and Effective Strategies to Learn About CCNA (Cisco Certified Network Associate) Routing And Switching Certification Walker Schmidt
    46. Unmasking the Social Engineer: The Human Element of Security Paul Ekman

    Elige el plan:

    • Más de 650.000 títulos

    • Kids mode

    • Modo sin conexión

    • Cancela cuando quieras

    ¡Más popular!
    Oferta por tiempo limitado

    Unlimited

    Nada mejor que un audiolibro para esta temporada.

    8.99 € /mes
    Ahorra 34%
    • 1 cuenta

    • Acceso ilimitado

    • Escucha y lee los títulos que quieras

    • Modo sin conexión + Kids Mode

    • Cancela en cualquier momento

    Suscríbete ahora

    Family

    Para los que quieren compartir historias con su familia y amigos.

    Desde 15.99 €/mes
    • 2-3 cuentas

    • Acceso ilimitado

    • Escucha y lee los títulos que quieras

    • Modo sin conexión + Kids Mode

    • Cancela en cualquier momento

    2 cuentas

    15.99 € /mes
    Pruébalo ahora