Kali Linux wireless penetration testing essentials: plan and execute penetration tests on wireless networks with the Kali Linux distribution
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2015
|
Ausgabe: | First published |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | IX, 140 Seiten Diagramme |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043630882 | ||
003 | DE-604 | ||
005 | 20160707 | ||
007 | t | ||
008 | 160617s2015 |||| |||| 00||| eng d | ||
020 | |z 9781785280856 |9 978-178528-085-6 | ||
020 | |z 1785280856 |9 1785280856 | ||
035 | |a (OCoLC)953449569 | ||
035 | |a (DE-599)BVBBV043630882 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-526 | ||
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Alamanni, Marco |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kali Linux wireless penetration testing essentials |b plan and execute penetration tests on wireless networks with the Kali Linux distribution |
250 | |a First published | ||
264 | 1 | |a Birmingham |b Packt Publishing |c 2015 | |
300 | |a IX, 140 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Kali Linux | |
650 | 7 | |a Kali Linux |2 fast | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computer networks / Security measures | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 1 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 1 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029044926&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029044926 |
Datensatz im Suchindex
_version_ | 1804176364505399296 |
---|---|
adam_text | Table of Contents
Preface V
Chapter 1: Introduction to Wireless Penetration Testing 1
Phases of penetration testing 2
The planning phase 2
The discovery phase 3
The attack phase 4
The reporting phase 4
The executive summary 5
The technical report 5
Summary 5
Chapter 2: Setting Up Your Machine with Kali Linux 7
Introduction to the Kali Linux distribution 7
Installing Kali Linux 8
Installation on a virtual machine 8
Creating a new virtual machine 9
Installation steps 12
Wireless adapter setup and configuration 17
Requirements of the wireless adapter 17
Wireless card configuration 18
Testing the adapter for wireless penetration testing 21
Troubleshooting 23
Summary 24
Chapter 3: WLAN Reconnaissance 2B
Introduction to 802,11 standard and wireless LAN 28
802.11 frames, types, and subtypes 26
Infrastructure mode and wireless access points 2o
Wireless security 20
Table of Contents
Wireless LAN scanning 29
Configuring the wireless adapter in monitor mode 30
Wireless scanning with airodump-ng 32
Wireless scanning with Kismet 35
Summary 41
Chapter 4: WEP Cracking______________________________________________ 43
An introduction to WEP 43
Attacks against WEP 44
WEP cracking with Aircrack-ng 45
Cracking the WEP key with connected clients 46
Cracking the WEP key without connected clients 49
The Fragmentation and ChopChop attacks 50
Forging and injecting ARP request frames 52
WEP cracking with automated tools 54
WEP cracking with Fern WiFi Cracker 55
Summary 60
Chapter 5: WPA/WPA2 Cracking___________________________________________61
An introduction to WPA/WPA2 61
Attacking the WPA 63
WPA cracking with Aircrack-ng 65
WPA cracking with Cowpatty 70
WPA cracking with the GPU 72
Pyrit 72
ocIHashcat 74
WPA cracking with automated tools 75
Wifite 75
Summary 78
Chapter 6: Attacking Access Points and the Infrastructure__________ 79
Attacks against Wi-Fi Protected Setup 79
Reaver 81
Attacking WPA-Enterprise 86
Setting up a WPA-Enterprise network 88
Attacks targeting EAP 90
Attacking PEAP 93
Denial of Service attacks 97
DoS attacks with MDK3 98
Rogue access points 100
Attacking AP authentication credentials 104
Summary 105
Table of Contents
Chapter 7: Wireless Client Attacks 107
Honeypot access points and Evil Twin attacks 107
The Evil Twin attack in practice 108
Man-in-the-middle attacks 112
Ghost phisher 113
The Caffe Latte attack 117
The Hirte attack 120
Cracking WPA keys without the AP 121
Summary 123
Chapter 8: Reporting and Conclusions 125
The four stages of report writing 125
Report planning 126
Information collection 126
Documentation tools 127
Writing the first draft 129
Review and finalization 129
The report format 129
The executive summary 130
The technical report 130
Summary 132
Conclusions 132
Appendix: References 133
Index 137
in
|
any_adam_object | 1 |
author | Alamanni, Marco |
author_facet | Alamanni, Marco |
author_role | aut |
author_sort | Alamanni, Marco |
author_variant | m a ma |
building | Verbundindex |
bvnumber | BV043630882 |
classification_rvk | ST 261 ST 276 |
ctrlnum | (OCoLC)953449569 (DE-599)BVBBV043630882 |
discipline | Informatik |
edition | First published |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02058nam a2200505 c 4500</leader><controlfield tag="001">BV043630882</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160707 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160617s2015 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781785280856</subfield><subfield code="9">978-178528-085-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1785280856</subfield><subfield code="9">1785280856</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)953449569</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043630882</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-526</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alamanni, Marco</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux wireless penetration testing essentials</subfield><subfield code="b">plan and execute penetration tests on wireless networks with the Kali Linux distribution</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First published</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 140 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029044926&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029044926</subfield></datafield></record></collection> |
id | DE-604.BV043630882 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:31:01Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029044926 |
oclc_num | 953449569 |
open_access_boolean | |
owner | DE-739 DE-526 |
owner_facet | DE-739 DE-526 |
physical | IX, 140 Seiten Diagramme |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing |
record_format | marc |
spelling | Alamanni, Marco Verfasser aut Kali Linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the Kali Linux distribution First published Birmingham Packt Publishing 2015 IX, 140 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Kali Linux Kali Linux fast Penetration testing (Computer security) Computer networks / Security measures Computer networks / Security measures fast Penetration testing (Computer security) fast Penetrationstest (DE-588)4825817-9 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Kali Linux (DE-588)1058901281 gnd rswk-swf Penetrationstest (DE-588)4825817-9 s Kali Linux (DE-588)1058901281 s DE-604 Datenverarbeitung (DE-588)4011152-0 s Sicherheit (DE-588)4054790-5 s Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029044926&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Alamanni, Marco Kali Linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the Kali Linux distribution Kali Linux Kali Linux fast Penetration testing (Computer security) Computer networks / Security measures Computer networks / Security measures fast Penetration testing (Computer security) fast Penetrationstest (DE-588)4825817-9 gnd Sicherheit (DE-588)4054790-5 gnd Datenverarbeitung (DE-588)4011152-0 gnd Kali Linux (DE-588)1058901281 gnd |
subject_GND | (DE-588)4825817-9 (DE-588)4054790-5 (DE-588)4011152-0 (DE-588)1058901281 |
title | Kali Linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the Kali Linux distribution |
title_auth | Kali Linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the Kali Linux distribution |
title_exact_search | Kali Linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the Kali Linux distribution |
title_full | Kali Linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the Kali Linux distribution |
title_fullStr | Kali Linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the Kali Linux distribution |
title_full_unstemmed | Kali Linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the Kali Linux distribution |
title_short | Kali Linux wireless penetration testing essentials |
title_sort | kali linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the kali linux distribution |
title_sub | plan and execute penetration tests on wireless networks with the Kali Linux distribution |
topic | Kali Linux Kali Linux fast Penetration testing (Computer security) Computer networks / Security measures Computer networks / Security measures fast Penetration testing (Computer security) fast Penetrationstest (DE-588)4825817-9 gnd Sicherheit (DE-588)4054790-5 gnd Datenverarbeitung (DE-588)4011152-0 gnd Kali Linux (DE-588)1058901281 gnd |
topic_facet | Kali Linux Penetration testing (Computer security) Computer networks / Security measures Penetrationstest Sicherheit Datenverarbeitung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029044926&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT alamannimarco kalilinuxwirelesspenetrationtestingessentialsplanandexecutepenetrationtestsonwirelessnetworkswiththekalilinuxdistribution |