- Kali Linux Wireless Penetration Testing Cookbook
- Sean Philip Oriyano
- 248字
- 2021-07-02 22:05:50
Getting started with Kali
Kali Linux is intended for both those who will perform pentesting and forensics; however in this book, we will be focusing on the former more than the latter. In fact, on the topic of pentesting, we will be focusing on using only those tools used to test and breach the security of wireless networks or devices.
In order to get the most out of this book and understand how it is used to penetrate wireless networks, you should have some basic skills in place to make things easier. It is expected that if you are going to start this journey into auditing wireless networks you should, at the very least, have the following skills:
- Good understanding of the TCP/IP protocol and IPv4
- Knowledge of the Open Systems Interconnect (OSI) model
- Understanding of network frame types (that is, IEEE 802.3, 802.11, and so on)
- Knowledge of radio frequencies and technologies is helpful, but optional
- Experience setting up and working with wireless devices and networks
- Hands-on experience working with Kali Linux is helpful, but we will fill in the gaps in your knowledge along the way
- Experience working with virtualization is optional if you intend to make use of it for hosting your setup
- Experience troubleshooting networks
- Comfort using the command line
Again, of these last few points, lack of them will not hurt you, but possessing them will go a long way in helping you both in this book and in your pentesting career.
- 為你護航:網絡空間安全科普讀本(第2版)
- 網絡安全保障能力研究
- Getting Started with FortiGate
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 編譯與反編譯技術實戰
- INSTANT Apple Configurator How-to
- 黑客攻防實戰從入門到精通
- VMware vCloud Security
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Cybersecurity Threats,Malware Trends,and Strategies
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 網絡空間安全法律問題研究
- Web代碼安全漏洞深度剖析
- Securing Network Infrastructure