舉報

會員
Kali Linux Wireless Penetration Testing Cookbook
最新章節:
How to do it...
Ifyouareasecurityprofessional,administrator,andanetworkprofessionalwhowantstoenhancetheirwirelesspenetrationtestingskillsandknowledgethenthisbookisforyou.Somepriorexperiencewithnetworkingsecurityandconceptsisexpected.
目錄(157章)
倒序
- 封面
- 版權信息
- Credits
- Disclaimer
- About the Author
- Acknowledgments
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Dedication
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- Kali Linux and Wireless Networking
- Introduction
- Getting started with Kali
- Installing Kali Linux
- Getting ready
- How to do it...
- Virtualized versus physical
- Pre-installation checklist
- Choosing an installation option
- Hard drive selection
- Network cards and wireless
- Installing Kali Linux on a PC
- Getting ready
- How to do it...
- Installing Kali in a virtual environment
- Getting ready
- How to do it...
- Updating Kali Linux
- How to do it...
- Preparing for wireless pentesting
- How to do it...
- There's more...
- Bluetooth adapters
- Attacking Access Controls
- Introduction
- Types of access control attacks
- Working with war driving
- Getting ready
- How to do it...
- Mapping access points and increasing accuracy
- Getting ready
- How to do it...
- Creating a rogue access point
- Getting ready
- How to do it...
- Evading MAC filtering with MAC spoofing
- Getting ready
- How to do it...
- Identifying promiscuous clients
- Getting ready
- How to do it...
- Attacking Integrity Controls
- Introduction
- Types of attack
- Sniffing on a wireless network
- How does sniffing work?
- Getting ready
- How to do it...
- Working with monitor mode and packet injection
- Getting ready
- How to do it...
- Performing a data replay
- Getting ready
- How to do it...
- Cracking WEP
- Getting ready
- How to do it...
- Phase one – configuring monitor mode
- Phase two – packet injection
- Phase three – capturing IVs
- Phase four – performing a fake authentication
- Phase five – ARP replay mode
- Phase six – obtaining the WEP key
- Attacking Confidentiality
- Introduction
- Types of attack
- Creating an evil twin
- Getting ready
- How to do it...
- Step one – monitor mode airmon-ng
- Step two – airdump-ng
- Step three – create a new AP with the same SSID and MAC address
- Step four – forcing a reconnect
- Step five – power up
- Man-in-the-middle with wireless
- Getting ready
- How to do it...
- Cracking WEP
- Getting ready
- Step one – monitor mode airmon-ng
- Step two – airdump-ng
- Step three – airdump-ng and traffic capture
- Step four – replay that traffic
- Step five – crack that traffic
- Attacking Availability
- Introduction
- Types of attack
- Executing a deauthentication flood
- Getting ready
- How to do it...
- Detecting beacon frames
- Getting ready
- How to do it...
- Spoofing beacon frames
- Getting ready
- How to do it...
- Creating a beacon flood
- Getting ready
- ARP cache poisoning
- Getting ready
- Authentication Attacks
- Attacks against authentication
- Types of attack
- WEP attacks
- Getting ready
- How to do it...
- WPA and WPA2 attacks
- Getting ready
- How to do it...
- Attacking WPS
- Getting ready
- How to do it...
- Bluetooth Attacks
- Introduction
- A brief history of Bluetooth
- A look at the technology
- Bluetooth in operation
- Bluetooth protocol stack
- Vulnerabilities in Bluetooth
- Selecting the Bluetooth hardware
- Types of attack
- Bluesmacking
- Getting ready
- Bluejacking
- Getting ready
- How to do it...
- Bluesnarfing
- Getting ready
- How to do it... 更新時間:2021-07-02 22:06:14
推薦閱讀
- 網絡安全與管理
- 科技安全:戰略實踐與展望
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- Python Penetration Testing Cookbook
- 模糊測試:強制發掘安全漏洞的利器
- Testing and Securing Android Studio Applications
- 網絡安全與攻防入門很輕松(實戰超值版)
- 物聯網安全滲透測試技術
- Instant Java Password and Authentication Security
- 黑客攻防實戰從入門到精通
- 云計算安全:關鍵技術、原理及應用
- 網絡安全監控實戰:深入理解事件檢測與響應
- 網絡空間安全實戰基礎
- 一本書講透混合云安全
- 大話數據恢復
- 網絡安全應急響應基礎理論及關鍵技術
- 防火墻和VPN技術與實踐
- Linux安全實戰
- Implementing AppFog
- INSTANT Citrix Security How-to
- 網絡綜合項目實踐
- 滲透測試基礎教程
- 漏洞
- Microsoft Forefront Identity Manager 2010 R2 Handbook
- 小小黑客之路
- 黑客攻防技術寶典:Web實戰篇(第2版)
- 走近安全:網絡世界的攻與防
- 身邊的網絡安全:互聯網時代的生活安全攻略
- 網絡安全態勢感知:提取、理解和預測
- VMware vSphere Security Cookbook