舉報

會員
Kali Linux Wireless Penetration Testing Cookbook
最新章節:
How to do it...
Ifyouareasecurityprofessional,administrator,andanetworkprofessionalwhowantstoenhancetheirwirelesspenetrationtestingskillsandknowledgethenthisbookisforyou.Somepriorexperiencewithnetworkingsecurityandconceptsisexpected.
目錄(157章)
倒序
- 封面
- 版權信息
- Credits
- Disclaimer
- About the Author
- Acknowledgments
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Dedication
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- Kali Linux and Wireless Networking
- Introduction
- Getting started with Kali
- Installing Kali Linux
- Getting ready
- How to do it...
- Virtualized versus physical
- Pre-installation checklist
- Choosing an installation option
- Hard drive selection
- Network cards and wireless
- Installing Kali Linux on a PC
- Getting ready
- How to do it...
- Installing Kali in a virtual environment
- Getting ready
- How to do it...
- Updating Kali Linux
- How to do it...
- Preparing for wireless pentesting
- How to do it...
- There's more...
- Bluetooth adapters
- Attacking Access Controls
- Introduction
- Types of access control attacks
- Working with war driving
- Getting ready
- How to do it...
- Mapping access points and increasing accuracy
- Getting ready
- How to do it...
- Creating a rogue access point
- Getting ready
- How to do it...
- Evading MAC filtering with MAC spoofing
- Getting ready
- How to do it...
- Identifying promiscuous clients
- Getting ready
- How to do it...
- Attacking Integrity Controls
- Introduction
- Types of attack
- Sniffing on a wireless network
- How does sniffing work?
- Getting ready
- How to do it...
- Working with monitor mode and packet injection
- Getting ready
- How to do it...
- Performing a data replay
- Getting ready
- How to do it...
- Cracking WEP
- Getting ready
- How to do it...
- Phase one – configuring monitor mode
- Phase two – packet injection
- Phase three – capturing IVs
- Phase four – performing a fake authentication
- Phase five – ARP replay mode
- Phase six – obtaining the WEP key
- Attacking Confidentiality
- Introduction
- Types of attack
- Creating an evil twin
- Getting ready
- How to do it...
- Step one – monitor mode airmon-ng
- Step two – airdump-ng
- Step three – create a new AP with the same SSID and MAC address
- Step four – forcing a reconnect
- Step five – power up
- Man-in-the-middle with wireless
- Getting ready
- How to do it...
- Cracking WEP
- Getting ready
- Step one – monitor mode airmon-ng
- Step two – airdump-ng
- Step three – airdump-ng and traffic capture
- Step four – replay that traffic
- Step five – crack that traffic
- Attacking Availability
- Introduction
- Types of attack
- Executing a deauthentication flood
- Getting ready
- How to do it...
- Detecting beacon frames
- Getting ready
- How to do it...
- Spoofing beacon frames
- Getting ready
- How to do it...
- Creating a beacon flood
- Getting ready
- ARP cache poisoning
- Getting ready
- Authentication Attacks
- Attacks against authentication
- Types of attack
- WEP attacks
- Getting ready
- How to do it...
- WPA and WPA2 attacks
- Getting ready
- How to do it...
- Attacking WPS
- Getting ready
- How to do it...
- Bluetooth Attacks
- Introduction
- A brief history of Bluetooth
- A look at the technology
- Bluetooth in operation
- Bluetooth protocol stack
- Vulnerabilities in Bluetooth
- Selecting the Bluetooth hardware
- Types of attack
- Bluesmacking
- Getting ready
- How to do it...
- Bluejacking
- Getting ready
- How to do it...
- Bluesnarfing
- Getting ready
- How to do it... 更新時間:2021-07-02 22:06:14
推薦閱讀
- Web漏洞分析與防范實戰:卷1
- 大型互聯網企業安全架構
- CSO進階之路:從安全工程師到首席安全官
- 等級保護測評理論及應用
- INSTANT Windows PowerShell
- 軟件開發安全之道:概念、設計與實施
- 計算機網絡安全技術研究
- 云原生安全與DevOps保障
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 數據安全架構設計與實戰
- Kali Linux高級滲透測試(原書第4版)
- Mastering Metasploit
- 黑客攻防從入門到精通:命令版
- 數據恢復技術深度揭秘
- Python Penetration Testing Essentials
- 數據安全實踐:能力體系、產品實現與解決方案
- 零信任安全從入門到精通
- Web安全與攻防實戰從新手到高手(微課超值版)
- 智能制造的信息安全
- 計算機網絡安全(第2版)
- Kali Linux Network Scanning Cookbook
- 內生安全:新一代網絡安全框架體系與實踐
- Microsoft Forefront Identity Manager 2010 R2 Handbook
- 計算機網絡安全
- 城市數字化轉型下的網絡與數據安全
- Web漏洞搜索
- 巧學活用網絡安全與維護
- SELinux System Administration
- 數據恢復實用技術
- 移動終端安全架構及關鍵技術