官术网_书友最值得收藏!

What this book covers

Chapter 1, Kali Linux and Wireless Networking, is an introduction to the world of Kali Linux and how it is used to perform wireless penetration testing.

Chapter 2,  Attacking Access Controls, focuses on what access controls are possible in wireless network and how these controls can be subverted.

Chapter 3,  Attacking Integrity Controls, explains the main components that have an effect on integrity and how these controls can be subverted.

Chapter 4,  Attacking Confidentiality, deals with the value of confidentiality in wireless networks and how it can be compromised and altered to intercept data and gather confidential information.

Chapter 5, Attacking Availability, focuses on the importance of availability within wireless networks and how availability can be affected to impact the operation of any wireless device or network.

Chapter 6, Authentication Attacks, concentrates on how authentication works within wireless networks and what can be done to attack, degrade, or shut down authentication components.

Chapter 7, Bluetooth Attacksfocuses on Bluetooth technology and how it can be attacked using similar concepts to wireless, as well as some new techniques.

主站蜘蛛池模板: 双辽市| 汪清县| 威海市| 台北县| 那坡县| 南京市| 台湾省| 铜山县| 南华县| 电白县| 台中县| 九江县| 白玉县| 延边| 肇源县| 九龙县| 柳河县| 温州市| 德州市| 都匀市| 营山县| 吐鲁番市| 微山县| 长寿区| 精河县| 育儿| 五台县| 涞水县| 蛟河市| 阿拉善左旗| 射洪县| 洪湖市| 柳河县| 绥芬河市| 临汾市| 上林县| 铅山县| 武义县| 武安市| 庆城县| 云阳县|