Key Features
Book Description
This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.What you will learn
- Explore the penetration testing methodology and its various phases
- Install Kali Linux on your laptop and configure the wireless adapter
- Scan and enumerate wireless LANs and point out their vulnerabilities
- Understand the WEP security protocol and the techniques to crack the authentication keys and break it
- Become proficient with the WPA/WPA2 protocol and use Kali Linux tools to attack it
- Attack the access points and take control of the wireless network
- Launch advanced attacks against clients
- Produce stunning and effective reports
Who this book is for
This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.
Table of Contents
- Introduction to wireless penetration testing
- Setting up your machine with Kali Linux
- WLAN reconnaissance
- WEP cracking
- WPA/WPA2 cracking
- Attacking access points and the infrastructure
- Wireless clients attacks
- Reporting and conclusions
- Appendix
Loading...
Loading...

