舉報

會員
Building a Pentesting Lab for Wireless Networks
最新章節:
Index
Ifyouareabeginnerorasecurityprofessionalwhowishestolearntobuildahomeorenterpriselabenvironmentwhereyoucansafelypracticepenetrationtestingtechniquesandimproveyourhackingskills,thenthisbookisforyou.Nopriorpenetrationtestingexperienceisrequired,asthelabenvironmentissuitableforvariousskilllevelsandisusedforawiderangeoftechniquesfrombasictoadvance.Whetheryouarebrandnewtoonlinelearningoryouareaseasonedexpert,youwillbeabletosetupyourownhackingplaygrounddependingonyourtasks.
目錄(60章)
倒序
- 封面
- 版權信息
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
- Chapter 1. Understanding Wireless Network Security and Risks
- Understanding wireless environment and threats
- Common WLAN protection mechanisms and their flaws
- Getting familiar with the Wi-Fi attack workflow
- Summary
- Chapter 2. Planning Your Lab Environment
- Understanding what tasks your lab should fulfill
- Planning the network topology
- Choosing appropriate components
- Planning lab security
- Security hints
- Summary
- Chapter 3. Configuring Networking Lab Components
- General lab network communication rules
- Configuring hardware wired devices
- Configuring virtual wired network devices
- Configuring WLANs
- Summary
- Chapter 4. Designing Application Lab Components
- Planning services
- Creating virtual servers and workstations
- Installing and configuring domain services
- Certification authority services
- Installing a remote management service
- Corporative e-mail service
- Installing vulnerable services
- Installing web applications
- Summary
- Chapter 5. Implementing Security
- Network-based security solutions
- Host-based security solutions
- SIEM
- Summary
- Chapter 6. Exploring Hacking Toolkits
- Wireless hacking tools
- Infrastructure hacking tools
- Cracking tools
- Web application hacking tools
- Summary
- Chapter 7. Preparing a Wireless Penetration Testing Platform
- Common variants of the pentesting platform
- Choosing an interface
- Installing the necessary software
- Preparing configs and scripts
- Preparing a Kali USB stick
- Summary
- Chapter 8. What's Next?
- What you can learn
- Courses and certificates
- Pentesting standards
- Information sources
- Summary
- Index 更新時間:2021-07-09 20:17:14
推薦閱讀
- App Inventor移動應用開發標準教程
- 電子元器件檢測技能1+1點撥
- 現代交換原理
- 通信專業實務:動力與環境
- 液晶顯示器維修技能實訓
- 電子電路識圖全突破(雙色版)
- 通信專業綜合能力(中級)
- 電子技術(第3版)
- 快修巧修新型液晶平板電視機
- 數字視聽產品原理與維修
- 快修巧修新型等離子和高清晰度電視機
- 寬帶無線通信多址傳輸技術演進
- 3D顯示技術、標準與應用
- 小基站(Small Cell)在新一代移動通信網絡中的部署與應用
- 光通信波段激光頻率環的實現及測速應用
- 光電定位與光電對抗
- 電信行業競爭分析方法與實踐
- 物聯網
- 5G-TSN協同架構與關鍵技術
- iOS程序員面試筆試寶典
- 5G:九大垂直領域的5G智慧賦能
- 新型DVD機維修數據速查寶典
- 集成電路CAD與實踐
- 可見光室內定位技術
- 集成電路設計
- 物聯網技術
- 快修巧修新型VCD/DVD機
- 雷達輻射式仿真信號分析與處理
- TD-LTE網絡規劃設計與優化(“十二五”國家重點圖書出版規劃項目)
- LTE無線網絡優化實踐(第2版)