Kali Linux wireless penetration testing beginners guide: master wireless testing techniques to survey and attack wireless networks with Kali Linux
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Birmingham [u.a.]
Packt Publ.
2015
|
Ausgabe: | 2. ed. |
Schriftenreihe: | Learn by doing : less theory, more results
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes index. - Packt Publishing open source community experience distilled |
Beschreibung: | IX, 192 Seiten Ill., graph. Darst. |
ISBN: | 9781783280414 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043630807 | ||
003 | DE-604 | ||
005 | 20160707 | ||
007 | t | ||
008 | 160617s2015 ad|| |||| 00||| eng d | ||
020 | |a 9781783280414 |9 978-1-78328-041-4 | ||
035 | |a (OCoLC)953422258 | ||
035 | |a (DE-599)GBV823991938 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
050 | 0 | |a TK5103.2 | |
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Ramachandran, Vivek |e Verfasser |0 (DE-588)1041848153 |4 aut | |
245 | 1 | 0 | |a Kali Linux wireless penetration testing beginners guide |b master wireless testing techniques to survey and attack wireless networks with Kali Linux |c Vivek Ramachandran ; Cameron Buchanan |
250 | |a 2. ed. | ||
264 | 1 | |a Birmingham [u.a.] |b Packt Publ. |c 2015 | |
300 | |a IX, 192 Seiten |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Learn by doing : less theory, more results | |
500 | |a Includes index. - Packt Publishing open source community experience distilled | ||
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 1 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 1 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Buchanan, Cameron |e Sonstige |0 (DE-588)1092225366 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029044889&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029044889 |
Datensatz im Suchindex
_version_ | 1804176364458213376 |
---|---|
adam_text | Table el Contents
Preface V
Chapter 1: Wireless Lab Setup 1
Hardware requirements 2
Software requirements
Installing Kali
Time for action ~ installing Kali
Setting up the access point 5
Time for action - configuring the access point 5
Setting up the wireless card 8
Time for action - configuring your wireless card 8
Connecting to the access point 9
Time for action - configuring your wireless card 9
Summary 12
Chapter 2: WLAN and its Inherent Insecurities 13
Revisiting WLAN frames
Time for action - creating a monitor mode interface
Time for action - sniffing wireless packets
Time for action - viewing management, control, and data frames
Time for action - sniffing data packets for our network
Time for action - packet injection
Important note on WLAN sniffing and injection
Time for action ~ experimenting with your adapter
14
16
19
The role of regulatory domains in
Time for action - experimenting with your adapter 31
Summary 36
Table of Contents
Chapter 3: Bypassing WLAN Authentication______________________________________37
Hidden SSIDs 38
Time for action - uncovering hidden SSIDs 38
MAC filters 44
Time for action - beating MAC filters 44
Open Authentication 47
Time for action - bypassing Open Authentication 47
Shared Key Authentication 48
Time for action - bypassing Shared Authentication 49
Summary 55
Chapter 4: WLAN Encryption Flaws __________________________________________ 57
WLAN encryption 58
WEP encryption 58
Time for action - cracking WEP 59
WPA/WPA2 72
Time for action - cracking WPA-PSK weak passphrases 75
Speeding up WPA/WPA2 PSK cracking 81
Time for action - speeding up the cracking process 82
Decrypting WEP and WPA packets 84
Time for action - decrypting WEP and WPA packets 85
Connecting to WEP and WPA networks 87
Time for action - connecting to a WEP network 88
Time for action - connecting to a WPA network 89
Summary 90
Chapter 5: Attacks on the WLAN Infrastructure_________________________________91
Default accounts and credentials on the access point 91
Time for action - cracking default accounts on the access points 92
Denial of service attacks 94
Time for action - deauthentication DoS attacks 94
Evil twin and access point MAC spoofing 100
Time for action - evil twins and MAC spoofing 101
A rogue access point 107
Time for action - cracking WEP 108
Summary 116
Chapter 6: Attacking the Client______________________________________________117
Honeypot and Mis-Association attacks 118
Time for action - orchestrating a Mis-Association attack 118
iiil
Table qfContents
The Caffe Latte attack 123
Time for action - conducting a Caffe Latte attack 124
Deauthentication and disassociation attacks 127
Time for action - deauthenticating the client 128
The Hirte attack 130
Time for action - cracking WEP with the Hirte attack 131
AP-less WPA-Personal cracking 132
Time for action - AP-less WPA cracking 134
Summary 135
Chapter 7: Advanced WLAN Attacks____________________________________________137
A man-in-the-middle attack 138
Time for action - man-in-the-middle attack 138
Wireless Eavesdropping using MITM 142
Time for action - Wireless Eavesdropping 142
Session hijacking over wireless 147
Time for action - session hijacking over wireless 148
Finding security configurations on the client 1§1
Time for action - deauthentication attacks on the client 152
Summary 155
Chapter 8: Attacking WPA-Enterprise and RADIUS______________________________157
Setting up FreeRADIUS-WPE 157
Time for action - setting up the AP with FreeRADIUS-WPE 158
Attacking PEAP 161
Time for action - cracking PEAP 162
EAP-TTLS 166
Security best practices for Enterprises 166
Summary 167
Chapter 9: WLAN Penetration Testing Methodology_____________________________lg§
Wireless penetration testing 169
Planning 170
Discovery 170
Attack
Cracking the encryption 171
Attacking infrastructure 172
Compromising clients 172
Reporting
Table of Contents
Chapter 10: WPS and Probes_____________________________________________________125
WPS attacks 175
Time for action - WPS attack 176
Probe sniffing 179
Time for action - collecting data 179
Summary 183
Appendix: Pop Quiz Answers____________________________________________________ 185
Chapter 1, Wireless Lab Setup 185
Chapter 2, WLAN and its Inherent Insecurities 185
Chapter 3, Bypassing WLAN Authentication 186
Chapter 4, WLAN Encryption Flaws 186
Chapter 5, Attacks on the WLAN Infrastructure 186
Chapter 6, Attacking the Client 186
Chapter 7, Advanced WLAN Attacks 187
Chapter 8, Attacking WPA-Enterprise and RADIUS 187
Index 189
iltfl
|
any_adam_object | 1 |
author | Ramachandran, Vivek |
author_GND | (DE-588)1041848153 (DE-588)1092225366 |
author_facet | Ramachandran, Vivek |
author_role | aut |
author_sort | Ramachandran, Vivek |
author_variant | v r vr |
building | Verbundindex |
bvnumber | BV043630807 |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.2 |
callnumber-search | TK5103.2 |
callnumber-sort | TK 45103.2 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 261 ST 276 |
ctrlnum | (OCoLC)953422258 (DE-599)GBV823991938 |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02037nam a2200469 c 4500</leader><controlfield tag="001">BV043630807</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160707 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160617s2015 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783280414</subfield><subfield code="9">978-1-78328-041-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)953422258</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV823991938</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5103.2</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ramachandran, Vivek</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1041848153</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux wireless penetration testing beginners guide</subfield><subfield code="b">master wireless testing techniques to survey and attack wireless networks with Kali Linux</subfield><subfield code="c">Vivek Ramachandran ; Cameron Buchanan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham [u.a.]</subfield><subfield code="b">Packt Publ.</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 192 Seiten</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Learn by doing : less theory, more results</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Packt Publishing open source community experience distilled</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Buchanan, Cameron</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1092225366</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029044889&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029044889</subfield></datafield></record></collection> |
id | DE-604.BV043630807 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:31:01Z |
institution | BVB |
isbn | 9781783280414 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029044889 |
oclc_num | 953422258 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | IX, 192 Seiten Ill., graph. Darst. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publ. |
record_format | marc |
series2 | Learn by doing : less theory, more results |
spelling | Ramachandran, Vivek Verfasser (DE-588)1041848153 aut Kali Linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with Kali Linux Vivek Ramachandran ; Cameron Buchanan 2. ed. Birmingham [u.a.] Packt Publ. 2015 IX, 192 Seiten Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Learn by doing : less theory, more results Includes index. - Packt Publishing open source community experience distilled Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Kali Linux (DE-588)1058901281 gnd rswk-swf Penetrationstest (DE-588)4825817-9 s Kali Linux (DE-588)1058901281 s DE-604 Datenverarbeitung (DE-588)4011152-0 s Sicherheit (DE-588)4054790-5 s Buchanan, Cameron Sonstige (DE-588)1092225366 oth Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029044889&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ramachandran, Vivek Kali Linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with Kali Linux Datenverarbeitung (DE-588)4011152-0 gnd Sicherheit (DE-588)4054790-5 gnd Penetrationstest (DE-588)4825817-9 gnd Kali Linux (DE-588)1058901281 gnd |
subject_GND | (DE-588)4011152-0 (DE-588)4054790-5 (DE-588)4825817-9 (DE-588)1058901281 |
title | Kali Linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with Kali Linux |
title_auth | Kali Linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with Kali Linux |
title_exact_search | Kali Linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with Kali Linux |
title_full | Kali Linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with Kali Linux Vivek Ramachandran ; Cameron Buchanan |
title_fullStr | Kali Linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with Kali Linux Vivek Ramachandran ; Cameron Buchanan |
title_full_unstemmed | Kali Linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with Kali Linux Vivek Ramachandran ; Cameron Buchanan |
title_short | Kali Linux wireless penetration testing beginners guide |
title_sort | kali linux wireless penetration testing beginners guide master wireless testing techniques to survey and attack wireless networks with kali linux |
title_sub | master wireless testing techniques to survey and attack wireless networks with Kali Linux |
topic | Datenverarbeitung (DE-588)4011152-0 gnd Sicherheit (DE-588)4054790-5 gnd Penetrationstest (DE-588)4825817-9 gnd Kali Linux (DE-588)1058901281 gnd |
topic_facet | Datenverarbeitung Sicherheit Penetrationstest Kali Linux |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029044889&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ramachandranvivek kalilinuxwirelesspenetrationtestingbeginnersguidemasterwirelesstestingtechniquestosurveyandattackwirelessnetworkswithkalilinux AT buchanancameron kalilinuxwirelesspenetrationtestingbeginnersguidemasterwirelesstestingtechniquestosurveyandattackwirelessnetworkswithkalilinux |