Kali Linux wireless penetration testing cookbook :: identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security /
More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless net...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2017.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ... |
Beschreibung: | 1 online resource (1 volume) : illustrations |
ISBN: | 9781783988440 1783988444 1783554088 9781783554089 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1020288718 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 180124s2017 enka o 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d IDEBK |d OCLCF |d N$T |d TOH |d CEF |d KSU |d DEBBG |d TEFOD |d G3B |d LVT |d S9I |d UAB |d OCLCQ |d OCLCO |d NZAUC |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
020 | |a 9781783988440 |q (electronic bk.) | ||
020 | |a 1783988444 |q (electronic bk.) | ||
020 | |a 1783554088 | ||
020 | |a 9781783554089 | ||
020 | |z 9781783554089 | ||
035 | |a (OCoLC)1020288718 | ||
037 | |a CL0500000932 |b Safari Books Online | ||
037 | |a F9880A1E-1359-4423-916A-B124DCB9155F |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Oriyano, Sean-Philip, |e author. | |
245 | 1 | 0 | |a Kali Linux wireless penetration testing cookbook : |b identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / |c Sean-Philip Oriyano. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2017. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed January 19, 2018). | |
505 | 0 | |a Cover -- Title Page -- Copyright -- Credits -- Disclaimer -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Kali Linux and Wireless Networking -- Introduction -- Getting started with Kali -- Installing Kali Linux -- Getting ready -- How to do it ... -- Virtualized versus physical -- Pre-installation checklist -- Choosing an installation option -- Hard drive selection -- Network cards and wireless -- Installing Kali Linux on a PC -- Getting ready -- How to do it ... -- Installing Kali in a virtual environment -- Getting ready -- How to do it ... -- Updating Kali Linux -- How to do it ... -- Preparing for wireless pentesting -- How to do it ... -- There's more ... -- Bluetooth adapters -- Chapter 2: Attacking Access Controls -- Introduction -- Types of access control attacks -- Working with war driving -- Getting ready -- How to do it ... -- Mapping access points and increasing accuracy -- Getting ready -- How to do it ... -- Creating a rogue access point -- Getting ready -- How to do it ... -- Evading MAC filtering with MAC spoofing -- Getting ready -- How to do it ... -- Identifying promiscuous clients -- Getting ready -- How to do it ... -- Chapter 3: Attacking Integrity Controls -- Introduction -- Types of attack -- Sniffing on a wireless network -- How does sniffing work? -- Getting ready -- How to do it ... -- Working with monitor mode and packet injection -- Getting ready -- How to do it ... -- Performing a data replay -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- How to do it ... -- Phase one -- configuring monitor mode -- Phase two -- packet injection -- Phase three -- capturing IVs -- Phase four -- performing a fake authentication -- Phase five -- ARP replay mode -- Phase six -- obtaining the WEP key. | |
505 | 8 | |a Chapter 4: Attacking Confidentiality -- Introduction -- Types of attack -- Creating an evil twin -- Getting ready -- How to do it ... -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- create a new AP with the same SSID and MAC address -- Step four -- forcing a reconnect -- Step five -- power up -- Man-in-the-middle with wireless -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- airdump-ng and traffic capture -- Step four -- replay that traffic -- Step five -- crack that traffic -- Chapter 5: Attacking Availability -- Introduction -- Types of attack -- Executing a deauthentication flood -- Getting ready -- How to do it ... -- Detecting beacon frames -- Getting ready -- How to do it ... -- Spoofing beacon frames -- Getting ready -- How to do it ... -- Creating a beacon flood -- Getting ready -- ARP cache poisoning -- Getting ready -- Chapter 6: Authentication Attacks -- Attacks against authentication -- Types of attack -- WEP attacks -- Getting ready -- How to do it ... -- WPA and WPA2 attacks -- Getting ready -- How to do it ... -- Attacking WPS -- Getting ready -- How to do it ... -- Chapter 7: Bluetooth Attacks -- Introduction -- A brief history of Bluetooth -- A look at the technology -- Bluetooth in operation -- Bluetooth protocol stack -- Vulnerabilities in Bluetooth -- Selecting the Bluetooth hardware -- Types of attack -- Bluesmacking -- Getting ready -- How to do it ... -- Bluejacking -- Getting ready -- How to do it ... -- Bluesnarfing -- Getting ready -- How to do it ... -- Index. | |
520 | |a More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ... | ||
630 | 0 | 0 | |a Kali Linux. |0 http://id.loc.gov/authorities/names/n2014001932 |
630 | 0 | 7 | |a Kali Linux |2 fast |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Wireless Internet. |0 http://id.loc.gov/authorities/subjects/sh2001008359 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Internet mobile. | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a Wireless Internet |2 fast | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1662021 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1662021 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis39290376 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1020288718 |
---|---|
_version_ | 1816882411417370624 |
adam_text | |
any_adam_object | |
author | Oriyano, Sean-Philip |
author_facet | Oriyano, Sean-Philip |
author_role | aut |
author_sort | Oriyano, Sean-Philip |
author_variant | s p o spo |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Title Page -- Copyright -- Credits -- Disclaimer -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Kali Linux and Wireless Networking -- Introduction -- Getting started with Kali -- Installing Kali Linux -- Getting ready -- How to do it ... -- Virtualized versus physical -- Pre-installation checklist -- Choosing an installation option -- Hard drive selection -- Network cards and wireless -- Installing Kali Linux on a PC -- Getting ready -- How to do it ... -- Installing Kali in a virtual environment -- Getting ready -- How to do it ... -- Updating Kali Linux -- How to do it ... -- Preparing for wireless pentesting -- How to do it ... -- There's more ... -- Bluetooth adapters -- Chapter 2: Attacking Access Controls -- Introduction -- Types of access control attacks -- Working with war driving -- Getting ready -- How to do it ... -- Mapping access points and increasing accuracy -- Getting ready -- How to do it ... -- Creating a rogue access point -- Getting ready -- How to do it ... -- Evading MAC filtering with MAC spoofing -- Getting ready -- How to do it ... -- Identifying promiscuous clients -- Getting ready -- How to do it ... -- Chapter 3: Attacking Integrity Controls -- Introduction -- Types of attack -- Sniffing on a wireless network -- How does sniffing work? -- Getting ready -- How to do it ... -- Working with monitor mode and packet injection -- Getting ready -- How to do it ... -- Performing a data replay -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- How to do it ... -- Phase one -- configuring monitor mode -- Phase two -- packet injection -- Phase three -- capturing IVs -- Phase four -- performing a fake authentication -- Phase five -- ARP replay mode -- Phase six -- obtaining the WEP key. Chapter 4: Attacking Confidentiality -- Introduction -- Types of attack -- Creating an evil twin -- Getting ready -- How to do it ... -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- create a new AP with the same SSID and MAC address -- Step four -- forcing a reconnect -- Step five -- power up -- Man-in-the-middle with wireless -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- airdump-ng and traffic capture -- Step four -- replay that traffic -- Step five -- crack that traffic -- Chapter 5: Attacking Availability -- Introduction -- Types of attack -- Executing a deauthentication flood -- Getting ready -- How to do it ... -- Detecting beacon frames -- Getting ready -- How to do it ... -- Spoofing beacon frames -- Getting ready -- How to do it ... -- Creating a beacon flood -- Getting ready -- ARP cache poisoning -- Getting ready -- Chapter 6: Authentication Attacks -- Attacks against authentication -- Types of attack -- WEP attacks -- Getting ready -- How to do it ... -- WPA and WPA2 attacks -- Getting ready -- How to do it ... -- Attacking WPS -- Getting ready -- How to do it ... -- Chapter 7: Bluetooth Attacks -- Introduction -- A brief history of Bluetooth -- A look at the technology -- Bluetooth in operation -- Bluetooth protocol stack -- Vulnerabilities in Bluetooth -- Selecting the Bluetooth hardware -- Types of attack -- Bluesmacking -- Getting ready -- How to do it ... -- Bluejacking -- Getting ready -- How to do it ... -- Bluesnarfing -- Getting ready -- How to do it ... -- Index. |
ctrlnum | (OCoLC)1020288718 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06179cam a2200553 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1020288718</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">180124s2017 enka o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCF</subfield><subfield code="d">N$T</subfield><subfield code="d">TOH</subfield><subfield code="d">CEF</subfield><subfield code="d">KSU</subfield><subfield code="d">DEBBG</subfield><subfield code="d">TEFOD</subfield><subfield code="d">G3B</subfield><subfield code="d">LVT</subfield><subfield code="d">S9I</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NZAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783988440</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783988444</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783554088</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783554089</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781783554089</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1020288718</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000932</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">F9880A1E-1359-4423-916A-B124DCB9155F</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean-Philip,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux wireless penetration testing cookbook :</subfield><subfield code="b">identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security /</subfield><subfield code="c">Sean-Philip Oriyano.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed January 19, 2018).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright -- Credits -- Disclaimer -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Kali Linux and Wireless Networking -- Introduction -- Getting started with Kali -- Installing Kali Linux -- Getting ready -- How to do it ... -- Virtualized versus physical -- Pre-installation checklist -- Choosing an installation option -- Hard drive selection -- Network cards and wireless -- Installing Kali Linux on a PC -- Getting ready -- How to do it ... -- Installing Kali in a virtual environment -- Getting ready -- How to do it ... -- Updating Kali Linux -- How to do it ... -- Preparing for wireless pentesting -- How to do it ... -- There's more ... -- Bluetooth adapters -- Chapter 2: Attacking Access Controls -- Introduction -- Types of access control attacks -- Working with war driving -- Getting ready -- How to do it ... -- Mapping access points and increasing accuracy -- Getting ready -- How to do it ... -- Creating a rogue access point -- Getting ready -- How to do it ... -- Evading MAC filtering with MAC spoofing -- Getting ready -- How to do it ... -- Identifying promiscuous clients -- Getting ready -- How to do it ... -- Chapter 3: Attacking Integrity Controls -- Introduction -- Types of attack -- Sniffing on a wireless network -- How does sniffing work? -- Getting ready -- How to do it ... -- Working with monitor mode and packet injection -- Getting ready -- How to do it ... -- Performing a data replay -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- How to do it ... -- Phase one -- configuring monitor mode -- Phase two -- packet injection -- Phase three -- capturing IVs -- Phase four -- performing a fake authentication -- Phase five -- ARP replay mode -- Phase six -- obtaining the WEP key.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 4: Attacking Confidentiality -- Introduction -- Types of attack -- Creating an evil twin -- Getting ready -- How to do it ... -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- create a new AP with the same SSID and MAC address -- Step four -- forcing a reconnect -- Step five -- power up -- Man-in-the-middle with wireless -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- airdump-ng and traffic capture -- Step four -- replay that traffic -- Step five -- crack that traffic -- Chapter 5: Attacking Availability -- Introduction -- Types of attack -- Executing a deauthentication flood -- Getting ready -- How to do it ... -- Detecting beacon frames -- Getting ready -- How to do it ... -- Spoofing beacon frames -- Getting ready -- How to do it ... -- Creating a beacon flood -- Getting ready -- ARP cache poisoning -- Getting ready -- Chapter 6: Authentication Attacks -- Attacks against authentication -- Types of attack -- WEP attacks -- Getting ready -- How to do it ... -- WPA and WPA2 attacks -- Getting ready -- How to do it ... -- Attacking WPS -- Getting ready -- How to do it ... -- Chapter 7: Bluetooth Attacks -- Introduction -- A brief history of Bluetooth -- A look at the technology -- Bluetooth in operation -- Bluetooth protocol stack -- Vulnerabilities in Bluetooth -- Selecting the Bluetooth hardware -- Types of attack -- Bluesmacking -- Getting ready -- How to do it ... -- Bluejacking -- Getting ready -- How to do it ... -- Bluesnarfing -- Getting ready -- How to do it ... -- Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ...</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Kali Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014001932</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless Internet.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2001008359</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet mobile.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless Internet</subfield><subfield code="2">fast</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1662021</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1662021</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis39290376</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1020288718 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:28:11Z |
institution | BVB |
isbn | 9781783988440 1783988444 1783554088 9781783554089 |
language | English |
oclc_num | 1020288718 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Oriyano, Sean-Philip, author. Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / Sean-Philip Oriyano. Birmingham, UK : Packt Publishing, 2017. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Online resource; title from title page (Safari, viewed January 19, 2018). Cover -- Title Page -- Copyright -- Credits -- Disclaimer -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Kali Linux and Wireless Networking -- Introduction -- Getting started with Kali -- Installing Kali Linux -- Getting ready -- How to do it ... -- Virtualized versus physical -- Pre-installation checklist -- Choosing an installation option -- Hard drive selection -- Network cards and wireless -- Installing Kali Linux on a PC -- Getting ready -- How to do it ... -- Installing Kali in a virtual environment -- Getting ready -- How to do it ... -- Updating Kali Linux -- How to do it ... -- Preparing for wireless pentesting -- How to do it ... -- There's more ... -- Bluetooth adapters -- Chapter 2: Attacking Access Controls -- Introduction -- Types of access control attacks -- Working with war driving -- Getting ready -- How to do it ... -- Mapping access points and increasing accuracy -- Getting ready -- How to do it ... -- Creating a rogue access point -- Getting ready -- How to do it ... -- Evading MAC filtering with MAC spoofing -- Getting ready -- How to do it ... -- Identifying promiscuous clients -- Getting ready -- How to do it ... -- Chapter 3: Attacking Integrity Controls -- Introduction -- Types of attack -- Sniffing on a wireless network -- How does sniffing work? -- Getting ready -- How to do it ... -- Working with monitor mode and packet injection -- Getting ready -- How to do it ... -- Performing a data replay -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- How to do it ... -- Phase one -- configuring monitor mode -- Phase two -- packet injection -- Phase three -- capturing IVs -- Phase four -- performing a fake authentication -- Phase five -- ARP replay mode -- Phase six -- obtaining the WEP key. Chapter 4: Attacking Confidentiality -- Introduction -- Types of attack -- Creating an evil twin -- Getting ready -- How to do it ... -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- create a new AP with the same SSID and MAC address -- Step four -- forcing a reconnect -- Step five -- power up -- Man-in-the-middle with wireless -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- airdump-ng and traffic capture -- Step four -- replay that traffic -- Step five -- crack that traffic -- Chapter 5: Attacking Availability -- Introduction -- Types of attack -- Executing a deauthentication flood -- Getting ready -- How to do it ... -- Detecting beacon frames -- Getting ready -- How to do it ... -- Spoofing beacon frames -- Getting ready -- How to do it ... -- Creating a beacon flood -- Getting ready -- ARP cache poisoning -- Getting ready -- Chapter 6: Authentication Attacks -- Attacks against authentication -- Types of attack -- WEP attacks -- Getting ready -- How to do it ... -- WPA and WPA2 attacks -- Getting ready -- How to do it ... -- Attacking WPS -- Getting ready -- How to do it ... -- Chapter 7: Bluetooth Attacks -- Introduction -- A brief history of Bluetooth -- A look at the technology -- Bluetooth in operation -- Bluetooth protocol stack -- Vulnerabilities in Bluetooth -- Selecting the Bluetooth hardware -- Types of attack -- Bluesmacking -- Getting ready -- How to do it ... -- Bluejacking -- Getting ready -- How to do it ... -- Bluesnarfing -- Getting ready -- How to do it ... -- Index. More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ... Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Wireless Internet. http://id.loc.gov/authorities/subjects/sh2001008359 Tests d'intrusion. Internet mobile. COMPUTERS Security Networking. bisacsh Penetration testing (Computer security) fast Wireless Internet fast FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1662021 Volltext |
spellingShingle | Oriyano, Sean-Philip Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / Cover -- Title Page -- Copyright -- Credits -- Disclaimer -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Kali Linux and Wireless Networking -- Introduction -- Getting started with Kali -- Installing Kali Linux -- Getting ready -- How to do it ... -- Virtualized versus physical -- Pre-installation checklist -- Choosing an installation option -- Hard drive selection -- Network cards and wireless -- Installing Kali Linux on a PC -- Getting ready -- How to do it ... -- Installing Kali in a virtual environment -- Getting ready -- How to do it ... -- Updating Kali Linux -- How to do it ... -- Preparing for wireless pentesting -- How to do it ... -- There's more ... -- Bluetooth adapters -- Chapter 2: Attacking Access Controls -- Introduction -- Types of access control attacks -- Working with war driving -- Getting ready -- How to do it ... -- Mapping access points and increasing accuracy -- Getting ready -- How to do it ... -- Creating a rogue access point -- Getting ready -- How to do it ... -- Evading MAC filtering with MAC spoofing -- Getting ready -- How to do it ... -- Identifying promiscuous clients -- Getting ready -- How to do it ... -- Chapter 3: Attacking Integrity Controls -- Introduction -- Types of attack -- Sniffing on a wireless network -- How does sniffing work? -- Getting ready -- How to do it ... -- Working with monitor mode and packet injection -- Getting ready -- How to do it ... -- Performing a data replay -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- How to do it ... -- Phase one -- configuring monitor mode -- Phase two -- packet injection -- Phase three -- capturing IVs -- Phase four -- performing a fake authentication -- Phase five -- ARP replay mode -- Phase six -- obtaining the WEP key. Chapter 4: Attacking Confidentiality -- Introduction -- Types of attack -- Creating an evil twin -- Getting ready -- How to do it ... -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- create a new AP with the same SSID and MAC address -- Step four -- forcing a reconnect -- Step five -- power up -- Man-in-the-middle with wireless -- Getting ready -- How to do it ... -- Cracking WEP -- Getting ready -- Step one -- monitor mode airmon-ng -- Step two -- airdump-ng -- Step three -- airdump-ng and traffic capture -- Step four -- replay that traffic -- Step five -- crack that traffic -- Chapter 5: Attacking Availability -- Introduction -- Types of attack -- Executing a deauthentication flood -- Getting ready -- How to do it ... -- Detecting beacon frames -- Getting ready -- How to do it ... -- Spoofing beacon frames -- Getting ready -- How to do it ... -- Creating a beacon flood -- Getting ready -- ARP cache poisoning -- Getting ready -- Chapter 6: Authentication Attacks -- Attacks against authentication -- Types of attack -- WEP attacks -- Getting ready -- How to do it ... -- WPA and WPA2 attacks -- Getting ready -- How to do it ... -- Attacking WPS -- Getting ready -- How to do it ... -- Chapter 7: Bluetooth Attacks -- Introduction -- A brief history of Bluetooth -- A look at the technology -- Bluetooth in operation -- Bluetooth protocol stack -- Vulnerabilities in Bluetooth -- Selecting the Bluetooth hardware -- Types of attack -- Bluesmacking -- Getting ready -- How to do it ... -- Bluejacking -- Getting ready -- How to do it ... -- Bluesnarfing -- Getting ready -- How to do it ... -- Index. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Wireless Internet. http://id.loc.gov/authorities/subjects/sh2001008359 Tests d'intrusion. Internet mobile. COMPUTERS Security Networking. bisacsh Penetration testing (Computer security) fast Wireless Internet fast |
subject_GND | http://id.loc.gov/authorities/names/n2014001932 http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh2001008359 |
title | Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / |
title_auth | Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / |
title_exact_search | Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / |
title_full | Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / Sean-Philip Oriyano. |
title_fullStr | Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / Sean-Philip Oriyano. |
title_full_unstemmed | Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / Sean-Philip Oriyano. |
title_short | Kali Linux wireless penetration testing cookbook : |
title_sort | kali linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network wi fi and bluetooth enabled devices to improve your wireless security |
title_sub | identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security / |
topic | Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Wireless Internet. http://id.loc.gov/authorities/subjects/sh2001008359 Tests d'intrusion. Internet mobile. COMPUTERS Security Networking. bisacsh Penetration testing (Computer security) fast Wireless Internet fast |
topic_facet | Kali Linux. Kali Linux Penetration testing (Computer security) Wireless Internet. Tests d'intrusion. Internet mobile. COMPUTERS Security Networking. Wireless Internet |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1662021 |
work_keys_str_mv | AT oriyanoseanphilip kalilinuxwirelesspenetrationtestingcookbookidentifyandassessvulnerabilitiespresentinyourwirelessnetworkwifiandbluetoothenableddevicestoimproveyourwirelesssecurity |