官术网_书友最值得收藏!

What this book covers

Chapter 1, Kali Linux and Wireless Networking, is an introduction to the world of Kali Linux and how it is used to perform wireless penetration testing.

Chapter 2,  Attacking Access Controls, focuses on what access controls are possible in wireless network and how these controls can be subverted.

Chapter 3,  Attacking Integrity Controls, explains the main components that have an effect on integrity and how these controls can be subverted.

Chapter 4,  Attacking Confidentiality, deals with the value of confidentiality in wireless networks and how it can be compromised and altered to intercept data and gather confidential information.

Chapter 5, Attacking Availability, focuses on the importance of availability within wireless networks and how availability can be affected to impact the operation of any wireless device or network.

Chapter 6, Authentication Attacks, concentrates on how authentication works within wireless networks and what can be done to attack, degrade, or shut down authentication components.

Chapter 7, Bluetooth Attacksfocuses on Bluetooth technology and how it can be attacked using similar concepts to wireless, as well as some new techniques.

主站蜘蛛池模板: 乌鲁木齐县| 右玉县| 泸西县| 唐山市| 广南县| 始兴县| 灵川县| 高尔夫| 临湘市| 准格尔旗| 长乐市| 察雅县| 睢宁县| 泸定县| 闽清县| 彭泽县| 沙洋县| 彭山县| 荥阳市| 婺源县| 楚雄市| 高雄市| 北京市| 酒泉市| 花莲市| 吉木乃县| 青阳县| 浏阳市| 梅州市| 潮州市| 应城市| 陵川县| 凤庆县| 紫金县| 章丘市| 新建县| 蛟河市| 施甸县| 玉山县| 新晃| 岐山县|