舉報

會員
Kali Linux Wireless Penetration Testing Cookbook
最新章節:
How to do it...
Ifyouareasecurityprofessional,administrator,andanetworkprofessionalwhowantstoenhancetheirwirelesspenetrationtestingskillsandknowledgethenthisbookisforyou.Somepriorexperiencewithnetworkingsecurityandconceptsisexpected.
目錄(157章)
倒序
- 封面
- 版權信息
- Credits
- Disclaimer
- About the Author
- Acknowledgments
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Dedication
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- Kali Linux and Wireless Networking
- Introduction
- Getting started with Kali
- Installing Kali Linux
- Getting ready
- How to do it...
- Virtualized versus physical
- Pre-installation checklist
- Choosing an installation option
- Hard drive selection
- Network cards and wireless
- Installing Kali Linux on a PC
- Getting ready
- How to do it...
- Installing Kali in a virtual environment
- Getting ready
- How to do it...
- Updating Kali Linux
- How to do it...
- Preparing for wireless pentesting
- How to do it...
- There's more...
- Bluetooth adapters
- Attacking Access Controls
- Introduction
- Types of access control attacks
- Working with war driving
- Getting ready
- How to do it...
- Mapping access points and increasing accuracy
- Getting ready
- How to do it...
- Creating a rogue access point
- Getting ready
- How to do it...
- Evading MAC filtering with MAC spoofing
- Getting ready
- How to do it...
- Identifying promiscuous clients
- Getting ready
- How to do it...
- Attacking Integrity Controls
- Introduction
- Types of attack
- Sniffing on a wireless network
- How does sniffing work?
- Getting ready
- How to do it...
- Working with monitor mode and packet injection
- Getting ready
- How to do it...
- Performing a data replay
- Getting ready
- How to do it...
- Cracking WEP
- Getting ready
- How to do it...
- Phase one – configuring monitor mode
- Phase two – packet injection
- Phase three – capturing IVs
- Phase four – performing a fake authentication
- Phase five – ARP replay mode
- Phase six – obtaining the WEP key
- Attacking Confidentiality
- Introduction
- Types of attack
- Creating an evil twin
- Getting ready
- How to do it...
- Step one – monitor mode airmon-ng
- Step two – airdump-ng
- Step three – create a new AP with the same SSID and MAC address
- Step four – forcing a reconnect
- Step five – power up
- Man-in-the-middle with wireless
- Getting ready
- How to do it...
- Cracking WEP
- Getting ready
- Step one – monitor mode airmon-ng
- Step two – airdump-ng
- Step three – airdump-ng and traffic capture
- Step four – replay that traffic
- Step five – crack that traffic
- Attacking Availability
- Introduction
- Types of attack
- Executing a deauthentication flood
- Getting ready
- How to do it...
- Detecting beacon frames
- Getting ready
- How to do it...
- Spoofing beacon frames
- Getting ready
- How to do it...
- Creating a beacon flood
- Getting ready
- ARP cache poisoning
- Getting ready
- Authentication Attacks
- Attacks against authentication
- Types of attack
- WEP attacks
- Getting ready
- How to do it...
- WPA and WPA2 attacks
- Getting ready
- How to do it...
- Attacking WPS
- Getting ready
- How to do it...
- Bluetooth Attacks
- Introduction
- A brief history of Bluetooth
- A look at the technology
- Bluetooth in operation
- Bluetooth protocol stack
- Vulnerabilities in Bluetooth
- Selecting the Bluetooth hardware
- Types of attack
- Bluesmacking
- Getting ready
- How to do it...
- Bluejacking
- Getting ready
- How to do it...
- Bluesnarfing
- Getting ready
- How to do it... 更新時間:2021-07-02 22:06:14
推薦閱讀
- Android應用安全實戰:Frida協議分析
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 特種木馬防御與檢測技術研究
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 網絡安全意識導論
- Wireshark 2 Quick Start Guide
- CTF競賽權威指南(Pwn篇)
- 網絡安全設計、配置與管理大全
- 華為防火墻實戰指南
- 人工智能安全(精裝版)
- CTF快速上手:PicoCTF真題解析(Web篇)
- 計算機網絡安全實驗指導
- 黑客攻防與電腦安全從新手到高手(超值版)
- 一本書讀透金融科技安全
- 網絡空間安全體系
- 網絡安全設計
- 云安全深度剖析:技術原理及應用實踐
- 極限黑客攻防:CTF賽題揭秘
- ATT&CK框架實踐指南(第2版)
- 數據安全實踐:能力體系、產品實現與解決方案
- 復雜網絡環境下訪問控制技術
- Learning Metasploit Exploitation and Development
- 網絡設備安全與防火墻
- Securing Docker
- Mastering Blockchain
- 網絡關鍵設備安全通用要求解讀
- 網絡綜合項目實踐
- 計算機網絡安全與防護
- 大模型安全、監管與合規
- 走近安全:網絡世界的攻與防