This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.
What you will learn
Explore the penetration testing methodology and its various phases
Install Kali Linux on your laptop and configure the wireless adapter
Scan and enumerate wireless LANs and point out their vulnerabilities
Understand the WEP security protocol and the techniques to crack the authentication keys and break it
Become proficient with the WPA/WPA2 protocol and use Kali Linux tools to attack it
Attack the access points and take control of the wireless network
Launch advanced attacks against clients
Produce stunning and effective reports
Who this book is for
This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.