Book Description
Kali Linux Wireless Penetration Testing Beginner’s Guide – Third Edition: Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
Kali Linux Wireless Penetration Testing Beginner’s Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.
Key Features
- Learn wireless penetration testing with Kali Linux
- Detect hidden wireless networks and discover their names
- Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
- Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks
Book Description
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.
Kali Linux Wireless Penetration Testing Beginner’s Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You’ll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.
What you will learn
- Understand the KRACK attack in full detail
- Create a wireless lab for your experiments
- Sniff out wireless packets, hidden networks, and SSIDs
- Capture and crack WPA-2 keys
- Sniff probe requests and track users through their SSID history
- Attack radius authentication systems
- Sniff wireless traffic and collect interesting data
- Decrypt encrypted traffic with stolen keys
Who This Book Is For
Kali Linux Wireless Penetration Testing Beginner’s Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks.
Table of Contents
Chapter 1. Wireless Lab Setup
Chapter 2. WLAN and its Inherent Insecurities
Chapter 3. Bypassing WLAN Authentication
Chapter 4. WLAN Encryption Flaws
Chapter 5. Attacks on the WLAN Infrastructure
Chapter 6. Attacking the Client
Chapter 7. Advanced WLAN Attacks
Chapter 8. KRACK Attacks
Chapter 9. Attacking WPA-Enterprise and RADIUS
Chapter 10. WLAN Penetration Testing Methodology
Chapter 11. WPS and Probes
中文:
书名:Kali Linux Wireless Penetration Testing Beginner’s Guide, 3rd Edition
Kali Linux无线渗透测试初学者指南第三版:掌握使用Kali Linux检测和攻击无线网络的无线测试技术,包括KRack攻击
Kali Linux无线渗透测试初学者指南,第三版提供了从头开始的无线五层测试,并已更新为最新的方法,包括全面覆盖KRACK攻击。
Key Features
- Learn wireless penetration testing with Kali Linux
- 检测隐藏的无线网络并发现其名称
- 探索先进的Wi-Fi黑客技术,包括恶意接入点托管和探测嗅探
- 培养您的加密破解技能,并深入了解攻击者使用的方法以及为这些攻击提供便利的底层技术
Book Description
随着无线网络在我们的生活中变得无处不在,无线渗透测试已经成为专业渗透测试仪的一项关键技能。最近发现的KRACK攻击再次突显了这一点,该攻击使攻击者能够潜在地侵入使用WPA2加密的Wi-Fi网络。Kali Linux安全发行版附带了大量用于网络攻击和检测安全漏洞的工具。
Kali Linux无线渗透测试初学者指南第三版已更新到Kali Linux 2017.3,包含最新的方法,包括全面覆盖KRACK攻击以及如何防御它。该书从头开始介绍无线测试,介绍每种新技术的渗透测试的所有元素。您将通过示例学习各种无线测试方法,从无线路由和加密的基础知识到黑客方法和攻击(如Hirte和Caffe Latte)的详细覆盖。
你将学到什么
- Understand the KRACK attack in full detail
- Create a wireless lab for your experiments
- Sniff out wireless packets, hidden networks, and SSIDs
- 捕获并破解WPA-2密钥
- 嗅探探测请求并通过用户的SSID历史记录跟踪用户
- Attack radius authentication systems
- Sniff wireless traffic and collect interesting data
- Decrypt encrypted traffic with stolen keys
这本书是为谁写的
Kali Linux无线渗透测试初学者指南,第三版适合任何想要了解更多关于五层测试以及如何理解和防御最新的无线网络攻击的人。
Table of Contents
Chapter 1. Wireless Lab Setup
Chapter 2. WLAN and its Inherent Insecurities
Chapter 3. Bypassing WLAN Authentication
Chapter 4. WLAN Encryption Flaws
Chapter 5. Attacks on the WLAN Infrastructure
Chapter 6. Attacking the Client
Chapter 7. Advanced WLAN Attacks
第8章:黑客攻击
Chapter 9. Attacking WPA-Enterprise and RADIUS
Chapter 10. WLAN Penetration Testing Methodology
第11章.WPS和探测
评论前必须登录!
注册