- Kali Linux Wireless Penetration Testing Cookbook
- Sean Philip Oriyano
- 188字
- 2021-07-02 22:05:48
What this book covers
Chapter 1, Kali Linux and Wireless Networking, is an introduction to the world of Kali Linux and how it is used to perform wireless penetration testing.
Chapter 2, Attacking Access Controls, focuses on what access controls are possible in wireless network and how these controls can be subverted.
Chapter 3, Attacking Integrity Controls, explains the main components that have an effect on integrity and how these controls can be subverted.
Chapter 4, Attacking Confidentiality, deals with the value of confidentiality in wireless networks and how it can be compromised and altered to intercept data and gather confidential information.
Chapter 5, Attacking Availability, focuses on the importance of availability within wireless networks and how availability can be affected to impact the operation of any wireless device or network.
Chapter 6, Authentication Attacks, concentrates on how authentication works within wireless networks and what can be done to attack, degrade, or shut down authentication components.
Chapter 7, Bluetooth Attacks, focuses on Bluetooth technology and how it can be attacked using similar concepts to wireless, as well as some new techniques.
- unidbg逆向工程:原理與實踐
- Mobile Forensics Cookbook
- SASE原理、架構與實踐
- INSTANT Windows PowerShell
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 網絡安全實戰詳解(企業專供版)
- Mastering Malware Analysis
- ATT&CK與威脅獵殺實戰
- 極限黑客攻防:CTF賽題揭秘
- 中國網絡空間安全前沿科技發展報告(2018)
- Web應用安全威脅與防治
- 網絡安全滲透測試
- 2018—2019年中國網絡安全發展藍皮書
- 物聯網安全