官术网_书友最值得收藏!

Introduction

In today's world, one of the most common ways to share information is through the use of wireless communications. Wi-Fi is used in many locations, including the home, the workplace, airports, coffee shops, retail shops, and many other areas too numerous to name.

With the popularity of this type of communication, it is a forgone conclusion that there is a lot of valuable information that is traversing these networks. It is due to this information and the inherent weaknesses in these networks that they are common targets for those wishing to steal access, or information, or both.

In this book, our intention is twofold, with one objective being to introduce you to the tools in Kali Linux designed to audit wireless network, and the other to show some of the different attacks that are possible. This approach will serve to give you not only information on the attacks and how they work, but also give you valuable insight into reducing the likelihood or effectiveness of these attacks.

主站蜘蛛池模板: 郓城县| 承德县| 靖西县| 武汉市| 乌拉特前旗| 建德市| 报价| 三亚市| 任丘市| 泰州市| 叙永县| 北京市| 肇源县| 含山县| 分宜县| 恩平市| 安塞县| 隆安县| 阿坝县| 丁青县| 青铜峡市| 浮梁县| 缙云县| 桐庐县| 周口市| 淮滨县| 南漳县| 陵川县| 金沙县| 婺源县| 尉犁县| 沾化县| 本溪| 义马市| 奈曼旗| 祁连县| 商河县| 古浪县| 铁岭县| 呼和浩特市| 同仁县|