Kali Linux wireless penetration testing essentials :: plan and execute penetration tests on wireless networks with the Kali Linux distribution /
This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic network...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2015.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781785284816 1785284819 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn918862369 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 150817s2015 enka ob 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d IDEBK |d EBLCP |d DEBSZ |d COO |d OCLCF |d TEFOD |d YDXCP |d DEBBG |d OCLCQ |d MERUC |d OCLCQ |d OCLCO |d N$T |d CEF |d NLE |d UKMGB |d OCLCQ |d WYU |d OCLCO |d UAB |d AU@ |d UKAHL |d OCLCQ |d OCLCO |d HS0 |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
016 | 7 | |a 018010496 |2 Uk | |
019 | |a 916530542 |a 923518056 | ||
020 | |a 9781785284816 |q (electronic bk.) | ||
020 | |a 1785284819 |q (electronic bk.) | ||
020 | |z 9781785280856 | ||
020 | |z 1785280856 | ||
035 | |a (OCoLC)918862369 |z (OCoLC)916530542 |z (OCoLC)923518056 | ||
037 | |a CL0500000628 |b Safari Books Online | ||
037 | |a 421BBC14-EEC9-4A92-8D67-7EA39F77F1FC |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.109234690 | |
049 | |a MAIN | ||
100 | 1 | |a Alamanni, Marco, |e author. | |
245 | 1 | 0 | |a Kali Linux wireless penetration testing essentials : |b plan and execute penetration tests on wireless networks with the Kali Linux distribution / |c Marco Alamanni. |
246 | 3 | 0 | |a Plan and execute penetration tests on wireless networks with the Kali Linux distribution |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2015. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from cover (Safari, viewed August 12, 2015). | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a ""Cover""; ""Copyright""; ""Credits""; ""Disclaimer""; ""About the Author""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Introduction to Wireless Penetration Testing""; ""Phases of penetration testing""; ""The planning phase""; ""The discovery phase""; ""The attack phase""; ""The reporting phase""; ""The executive summary""; ""The technical report""; ""Summary""; ""Chapter 2: Setting Up Your Machine with Kali Linux""; ""Introduction to the Kali Linux distribution""; ""Installing Kali Linux""; ""Installation on a virtual machine"" | |
505 | 8 | |a ""Creating a new virtual machine""""Installation steps""; ""Wireless adapter setup and configuration""; ""Requirements of the wireless adapter""; ""Wireless card configuration""; ""Testing the adapter for wireless penetration testing""; ""Troubleshooting""; ""Summary""; ""Chapter 3: WLAN Reconnaissance""; ""Introduction to 802.11 standard and wireless LAN""; ""802.11 frames, types, and subtypes""; ""Infrastructure mode and wireless access points""; ""Wireless security""; ""Wireless LAN scanning""; ""Configuring the wireless adapter in monitor mode""; ""Wireless scanning with airodump-ng"" | |
505 | 8 | |a ""Wireless scanning with Kismet""""Summary""; ""Chapter 4: WEP Cracking""; ""An introduction to WEP""; ""Attacks against WEP""; ""WEP cracking with Aircrack-ng""; ""Cracking the WEP key with connected clients""; ""Cracking the WEP key without connected clients""; ""The Fragmentation and ChopChop attacks""; ""Forging and injecting ARP request frames""; ""WEP cracking with automated tools""; ""WEP cracking with Fern WiFi Cracker""; ""Summary""; ""Chapter 5: WPA/WPA2 Cracking""; ""An introduction to WPA/WPA2""; ""Attacking the WPA""; ""WPA cracking with Aircrack-ng"" | |
505 | 8 | |a ""WPA cracking with Cowpatty""""WPA cracking with the GPU""; ""Pyrit""; ""oclHashcat""; ""WPA cracking with automated tools""; ""Wifite""; ""Summary""; ""Chapter 6: Attacking Access Points and the Infrastructure""; ""Attacks against Wi-Fi Protected Setup""; ""Reaver""; ""Attacking WPA-Enterprise""; ""Setting up a WPA-Enterprise network""; ""Attacks targeting EAP""; ""Attacking PEAP""; ""Denial of Service attacks""; ""DoS attacks with MDK3""; ""Rogue access points""; ""Attacking AP authentication credentials""; ""Summary""; ""Chapter 7: Wireless Client Attacks"" | |
505 | 8 | |a ""Honeypot access points and Evil Twin attacks""""The Evil Twin attack in practice""; ""Man-in-the-middle attacks""; ""Ghost phisher""; ""The Caffe Latte attack""; ""The Hirte attack""; ""Cracking WPA keys without the AP""; ""Summary""; ""Chapter 8: Reporting and Conclusions""; ""The four stages of report writing""; ""Report planning""; ""Information collection""; ""Documentation tools""; ""Writing the first draft""; ""Review and finalization""; ""The report format""; ""The executive summary""; ""The technical report""; ""Summary""; ""Conclusions""; ""Appendix: References""; ""Index"" | |
520 | |a This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended. | ||
630 | 0 | 0 | |a Linux. |0 http://id.loc.gov/authorities/names/n94087892 |
630 | 0 | 7 | |a Linux |2 fast |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Wireless Internet. |0 http://id.loc.gov/authorities/subjects/sh2001008359 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Internet mobile. | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a Wireless Internet |2 fast | |
650 | 7 | |a Computer Science. |2 hilcc | |
650 | 7 | |a Engineering & Applied Sciences. |2 hilcc | |
758 | |i has work: |a Kali Linux Wireless Penetration Testing Essentials (Work) |1 https://id.oclc.org/worldcat/entity/E39PCYMJbqkc6HfcRjcXHT4RjC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Alamanni, Marco. |t Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution. |d Birmingham, England : Packt Publishing, ©2015 |h ix, 140 pages |k Community experience distilled. |z 9781785280856 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1046856 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH29022136 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL2120330 | ||
938 | |a EBSCOhost |b EBSC |n 1046856 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis32260736 | ||
938 | |a YBP Library Services |b YANK |n 12552585 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn918862369 |
---|---|
_version_ | 1816882320968253440 |
adam_text | |
any_adam_object | |
author | Alamanni, Marco |
author_facet | Alamanni, Marco |
author_role | aut |
author_sort | Alamanni, Marco |
author_variant | m a ma |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | ""Cover""; ""Copyright""; ""Credits""; ""Disclaimer""; ""About the Author""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Introduction to Wireless Penetration Testing""; ""Phases of penetration testing""; ""The planning phase""; ""The discovery phase""; ""The attack phase""; ""The reporting phase""; ""The executive summary""; ""The technical report""; ""Summary""; ""Chapter 2: Setting Up Your Machine with Kali Linux""; ""Introduction to the Kali Linux distribution""; ""Installing Kali Linux""; ""Installation on a virtual machine"" ""Creating a new virtual machine""""Installation steps""; ""Wireless adapter setup and configuration""; ""Requirements of the wireless adapter""; ""Wireless card configuration""; ""Testing the adapter for wireless penetration testing""; ""Troubleshooting""; ""Summary""; ""Chapter 3: WLAN Reconnaissance""; ""Introduction to 802.11 standard and wireless LAN""; ""802.11 frames, types, and subtypes""; ""Infrastructure mode and wireless access points""; ""Wireless security""; ""Wireless LAN scanning""; ""Configuring the wireless adapter in monitor mode""; ""Wireless scanning with airodump-ng"" ""Wireless scanning with Kismet""""Summary""; ""Chapter 4: WEP Cracking""; ""An introduction to WEP""; ""Attacks against WEP""; ""WEP cracking with Aircrack-ng""; ""Cracking the WEP key with connected clients""; ""Cracking the WEP key without connected clients""; ""The Fragmentation and ChopChop attacks""; ""Forging and injecting ARP request frames""; ""WEP cracking with automated tools""; ""WEP cracking with Fern WiFi Cracker""; ""Summary""; ""Chapter 5: WPA/WPA2 Cracking""; ""An introduction to WPA/WPA2""; ""Attacking the WPA""; ""WPA cracking with Aircrack-ng"" ""WPA cracking with Cowpatty""""WPA cracking with the GPU""; ""Pyrit""; ""oclHashcat""; ""WPA cracking with automated tools""; ""Wifite""; ""Summary""; ""Chapter 6: Attacking Access Points and the Infrastructure""; ""Attacks against Wi-Fi Protected Setup""; ""Reaver""; ""Attacking WPA-Enterprise""; ""Setting up a WPA-Enterprise network""; ""Attacks targeting EAP""; ""Attacking PEAP""; ""Denial of Service attacks""; ""DoS attacks with MDK3""; ""Rogue access points""; ""Attacking AP authentication credentials""; ""Summary""; ""Chapter 7: Wireless Client Attacks"" ""Honeypot access points and Evil Twin attacks""""The Evil Twin attack in practice""; ""Man-in-the-middle attacks""; ""Ghost phisher""; ""The Caffe Latte attack""; ""The Hirte attack""; ""Cracking WPA keys without the AP""; ""Summary""; ""Chapter 8: Reporting and Conclusions""; ""The four stages of report writing""; ""Report planning""; ""Information collection""; ""Documentation tools""; ""Writing the first draft""; ""Review and finalization""; ""The report format""; ""The executive summary""; ""The technical report""; ""Summary""; ""Conclusions""; ""Appendix: References""; ""Index"" |
ctrlnum | (OCoLC)918862369 |
dewey-full | 004.109234690 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.109234690 |
dewey-search | 004.109234690 |
dewey-sort | 14.109234690 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07271cam a2200865 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn918862369</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">150817s2015 enka ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">TEFOD</subfield><subfield code="d">YDXCP</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">CEF</subfield><subfield code="d">NLE</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UAB</subfield><subfield code="d">AU@</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018010496</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">916530542</subfield><subfield code="a">923518056</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785284816</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785284819</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781785280856</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1785280856</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)918862369</subfield><subfield code="z">(OCoLC)916530542</subfield><subfield code="z">(OCoLC)923518056</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000628</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">421BBC14-EEC9-4A92-8D67-7EA39F77F1FC</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.109234690</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alamanni, Marco,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux wireless penetration testing essentials :</subfield><subfield code="b">plan and execute penetration tests on wireless networks with the Kali Linux distribution /</subfield><subfield code="c">Marco Alamanni.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Plan and execute penetration tests on wireless networks with the Kali Linux distribution</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed August 12, 2015).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">""Cover""; ""Copyright""; ""Credits""; ""Disclaimer""; ""About the Author""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Introduction to Wireless Penetration Testing""; ""Phases of penetration testing""; ""The planning phase""; ""The discovery phase""; ""The attack phase""; ""The reporting phase""; ""The executive summary""; ""The technical report""; ""Summary""; ""Chapter 2: Setting Up Your Machine with Kali Linux""; ""Introduction to the Kali Linux distribution""; ""Installing Kali Linux""; ""Installation on a virtual machine""</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">""Creating a new virtual machine""""Installation steps""; ""Wireless adapter setup and configuration""; ""Requirements of the wireless adapter""; ""Wireless card configuration""; ""Testing the adapter for wireless penetration testing""; ""Troubleshooting""; ""Summary""; ""Chapter 3: WLAN Reconnaissance""; ""Introduction to 802.11 standard and wireless LAN""; ""802.11 frames, types, and subtypes""; ""Infrastructure mode and wireless access points""; ""Wireless security""; ""Wireless LAN scanning""; ""Configuring the wireless adapter in monitor mode""; ""Wireless scanning with airodump-ng""</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">""Wireless scanning with Kismet""""Summary""; ""Chapter 4: WEP Cracking""; ""An introduction to WEP""; ""Attacks against WEP""; ""WEP cracking with Aircrack-ng""; ""Cracking the WEP key with connected clients""; ""Cracking the WEP key without connected clients""; ""The Fragmentation and ChopChop attacks""; ""Forging and injecting ARP request frames""; ""WEP cracking with automated tools""; ""WEP cracking with Fern WiFi Cracker""; ""Summary""; ""Chapter 5: WPA/WPA2 Cracking""; ""An introduction to WPA/WPA2""; ""Attacking the WPA""; ""WPA cracking with Aircrack-ng""</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">""WPA cracking with Cowpatty""""WPA cracking with the GPU""; ""Pyrit""; ""oclHashcat""; ""WPA cracking with automated tools""; ""Wifite""; ""Summary""; ""Chapter 6: Attacking Access Points and the Infrastructure""; ""Attacks against Wi-Fi Protected Setup""; ""Reaver""; ""Attacking WPA-Enterprise""; ""Setting up a WPA-Enterprise network""; ""Attacks targeting EAP""; ""Attacking PEAP""; ""Denial of Service attacks""; ""DoS attacks with MDK3""; ""Rogue access points""; ""Attacking AP authentication credentials""; ""Summary""; ""Chapter 7: Wireless Client Attacks""</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">""Honeypot access points and Evil Twin attacks""""The Evil Twin attack in practice""; ""Man-in-the-middle attacks""; ""Ghost phisher""; ""The Caffe Latte attack""; ""The Hirte attack""; ""Cracking WPA keys without the AP""; ""Summary""; ""Chapter 8: Reporting and Conclusions""; ""The four stages of report writing""; ""Report planning""; ""Information collection""; ""Documentation tools""; ""Writing the first draft""; ""Review and finalization""; ""The report format""; ""The executive summary""; ""The technical report""; ""Summary""; ""Conclusions""; ""Appendix: References""; ""Index""</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94087892</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless Internet.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2001008359</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet mobile.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless Internet</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Science.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Engineering & Applied Sciences.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Kali Linux Wireless Penetration Testing Essentials (Work)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYMJbqkc6HfcRjcXHT4RjC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Alamanni, Marco.</subfield><subfield code="t">Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution.</subfield><subfield code="d">Birmingham, England : Packt Publishing, ©2015</subfield><subfield code="h">ix, 140 pages</subfield><subfield code="k">Community experience distilled.</subfield><subfield code="z">9781785280856</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1046856</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH29022136</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL2120330</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1046856</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis32260736</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12552585</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn918862369 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:45Z |
institution | BVB |
isbn | 9781785284816 1785284819 |
language | English |
oclc_num | 918862369 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing, |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Alamanni, Marco, author. Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution / Marco Alamanni. Plan and execute penetration tests on wireless networks with the Kali Linux distribution Birmingham, UK : Packt Publishing, 2015. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Community experience distilled Online resource; title from cover (Safari, viewed August 12, 2015). Includes bibliographical references and index. ""Cover""; ""Copyright""; ""Credits""; ""Disclaimer""; ""About the Author""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Introduction to Wireless Penetration Testing""; ""Phases of penetration testing""; ""The planning phase""; ""The discovery phase""; ""The attack phase""; ""The reporting phase""; ""The executive summary""; ""The technical report""; ""Summary""; ""Chapter 2: Setting Up Your Machine with Kali Linux""; ""Introduction to the Kali Linux distribution""; ""Installing Kali Linux""; ""Installation on a virtual machine"" ""Creating a new virtual machine""""Installation steps""; ""Wireless adapter setup and configuration""; ""Requirements of the wireless adapter""; ""Wireless card configuration""; ""Testing the adapter for wireless penetration testing""; ""Troubleshooting""; ""Summary""; ""Chapter 3: WLAN Reconnaissance""; ""Introduction to 802.11 standard and wireless LAN""; ""802.11 frames, types, and subtypes""; ""Infrastructure mode and wireless access points""; ""Wireless security""; ""Wireless LAN scanning""; ""Configuring the wireless adapter in monitor mode""; ""Wireless scanning with airodump-ng"" ""Wireless scanning with Kismet""""Summary""; ""Chapter 4: WEP Cracking""; ""An introduction to WEP""; ""Attacks against WEP""; ""WEP cracking with Aircrack-ng""; ""Cracking the WEP key with connected clients""; ""Cracking the WEP key without connected clients""; ""The Fragmentation and ChopChop attacks""; ""Forging and injecting ARP request frames""; ""WEP cracking with automated tools""; ""WEP cracking with Fern WiFi Cracker""; ""Summary""; ""Chapter 5: WPA/WPA2 Cracking""; ""An introduction to WPA/WPA2""; ""Attacking the WPA""; ""WPA cracking with Aircrack-ng"" ""WPA cracking with Cowpatty""""WPA cracking with the GPU""; ""Pyrit""; ""oclHashcat""; ""WPA cracking with automated tools""; ""Wifite""; ""Summary""; ""Chapter 6: Attacking Access Points and the Infrastructure""; ""Attacks against Wi-Fi Protected Setup""; ""Reaver""; ""Attacking WPA-Enterprise""; ""Setting up a WPA-Enterprise network""; ""Attacks targeting EAP""; ""Attacking PEAP""; ""Denial of Service attacks""; ""DoS attacks with MDK3""; ""Rogue access points""; ""Attacking AP authentication credentials""; ""Summary""; ""Chapter 7: Wireless Client Attacks"" ""Honeypot access points and Evil Twin attacks""""The Evil Twin attack in practice""; ""Man-in-the-middle attacks""; ""Ghost phisher""; ""The Caffe Latte attack""; ""The Hirte attack""; ""Cracking WPA keys without the AP""; ""Summary""; ""Chapter 8: Reporting and Conclusions""; ""The four stages of report writing""; ""Report planning""; ""Information collection""; ""Documentation tools""; ""Writing the first draft""; ""Review and finalization""; ""The report format""; ""The executive summary""; ""The technical report""; ""Summary""; ""Conclusions""; ""Appendix: References""; ""Index"" This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended. Linux. http://id.loc.gov/authorities/names/n94087892 Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Wireless Internet. http://id.loc.gov/authorities/subjects/sh2001008359 Tests d'intrusion. Internet mobile. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Penetration testing (Computer security) fast Wireless Internet fast Computer Science. hilcc Engineering & Applied Sciences. hilcc has work: Kali Linux Wireless Penetration Testing Essentials (Work) https://id.oclc.org/worldcat/entity/E39PCYMJbqkc6HfcRjcXHT4RjC https://id.oclc.org/worldcat/ontology/hasWork Print version: Alamanni, Marco. Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution. Birmingham, England : Packt Publishing, ©2015 ix, 140 pages Community experience distilled. 9781785280856 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1046856 Volltext |
spellingShingle | Alamanni, Marco Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution / Community experience distilled. ""Cover""; ""Copyright""; ""Credits""; ""Disclaimer""; ""About the Author""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Introduction to Wireless Penetration Testing""; ""Phases of penetration testing""; ""The planning phase""; ""The discovery phase""; ""The attack phase""; ""The reporting phase""; ""The executive summary""; ""The technical report""; ""Summary""; ""Chapter 2: Setting Up Your Machine with Kali Linux""; ""Introduction to the Kali Linux distribution""; ""Installing Kali Linux""; ""Installation on a virtual machine"" ""Creating a new virtual machine""""Installation steps""; ""Wireless adapter setup and configuration""; ""Requirements of the wireless adapter""; ""Wireless card configuration""; ""Testing the adapter for wireless penetration testing""; ""Troubleshooting""; ""Summary""; ""Chapter 3: WLAN Reconnaissance""; ""Introduction to 802.11 standard and wireless LAN""; ""802.11 frames, types, and subtypes""; ""Infrastructure mode and wireless access points""; ""Wireless security""; ""Wireless LAN scanning""; ""Configuring the wireless adapter in monitor mode""; ""Wireless scanning with airodump-ng"" ""Wireless scanning with Kismet""""Summary""; ""Chapter 4: WEP Cracking""; ""An introduction to WEP""; ""Attacks against WEP""; ""WEP cracking with Aircrack-ng""; ""Cracking the WEP key with connected clients""; ""Cracking the WEP key without connected clients""; ""The Fragmentation and ChopChop attacks""; ""Forging and injecting ARP request frames""; ""WEP cracking with automated tools""; ""WEP cracking with Fern WiFi Cracker""; ""Summary""; ""Chapter 5: WPA/WPA2 Cracking""; ""An introduction to WPA/WPA2""; ""Attacking the WPA""; ""WPA cracking with Aircrack-ng"" ""WPA cracking with Cowpatty""""WPA cracking with the GPU""; ""Pyrit""; ""oclHashcat""; ""WPA cracking with automated tools""; ""Wifite""; ""Summary""; ""Chapter 6: Attacking Access Points and the Infrastructure""; ""Attacks against Wi-Fi Protected Setup""; ""Reaver""; ""Attacking WPA-Enterprise""; ""Setting up a WPA-Enterprise network""; ""Attacks targeting EAP""; ""Attacking PEAP""; ""Denial of Service attacks""; ""DoS attacks with MDK3""; ""Rogue access points""; ""Attacking AP authentication credentials""; ""Summary""; ""Chapter 7: Wireless Client Attacks"" ""Honeypot access points and Evil Twin attacks""""The Evil Twin attack in practice""; ""Man-in-the-middle attacks""; ""Ghost phisher""; ""The Caffe Latte attack""; ""The Hirte attack""; ""Cracking WPA keys without the AP""; ""Summary""; ""Chapter 8: Reporting and Conclusions""; ""The four stages of report writing""; ""Report planning""; ""Information collection""; ""Documentation tools""; ""Writing the first draft""; ""Review and finalization""; ""The report format""; ""The executive summary""; ""The technical report""; ""Summary""; ""Conclusions""; ""Appendix: References""; ""Index"" Linux. http://id.loc.gov/authorities/names/n94087892 Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Wireless Internet. http://id.loc.gov/authorities/subjects/sh2001008359 Tests d'intrusion. Internet mobile. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Penetration testing (Computer security) fast Wireless Internet fast Computer Science. hilcc Engineering & Applied Sciences. hilcc |
subject_GND | http://id.loc.gov/authorities/names/n94087892 http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh2001008359 |
title | Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution / |
title_alt | Plan and execute penetration tests on wireless networks with the Kali Linux distribution |
title_auth | Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution / |
title_exact_search | Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution / |
title_full | Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution / Marco Alamanni. |
title_fullStr | Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution / Marco Alamanni. |
title_full_unstemmed | Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution / Marco Alamanni. |
title_short | Kali Linux wireless penetration testing essentials : |
title_sort | kali linux wireless penetration testing essentials plan and execute penetration tests on wireless networks with the kali linux distribution |
title_sub | plan and execute penetration tests on wireless networks with the Kali Linux distribution / |
topic | Linux. http://id.loc.gov/authorities/names/n94087892 Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Wireless Internet. http://id.loc.gov/authorities/subjects/sh2001008359 Tests d'intrusion. Internet mobile. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Penetration testing (Computer security) fast Wireless Internet fast Computer Science. hilcc Engineering & Applied Sciences. hilcc |
topic_facet | Linux. Linux Penetration testing (Computer security) Wireless Internet. Tests d'intrusion. Internet mobile. COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. Wireless Internet Computer Science. Engineering & Applied Sciences. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1046856 |
work_keys_str_mv | AT alamannimarco kalilinuxwirelesspenetrationtestingessentialsplanandexecutepenetrationtestsonwirelessnetworkswiththekalilinuxdistribution AT alamannimarco planandexecutepenetrationtestsonwirelessnetworkswiththekalilinuxdistribution |