官术网_书友最值得收藏!

Introduction

In today's world, one of the most common ways to share information is through the use of wireless communications. Wi-Fi is used in many locations, including the home, the workplace, airports, coffee shops, retail shops, and many other areas too numerous to name.

With the popularity of this type of communication, it is a forgone conclusion that there is a lot of valuable information that is traversing these networks. It is due to this information and the inherent weaknesses in these networks that they are common targets for those wishing to steal access, or information, or both.

In this book, our intention is twofold, with one objective being to introduce you to the tools in Kali Linux designed to audit wireless network, and the other to show some of the different attacks that are possible. This approach will serve to give you not only information on the attacks and how they work, but also give you valuable insight into reducing the likelihood or effectiveness of these attacks.

主站蜘蛛池模板: 襄垣县| 沅陵县| 南皮县| 民乐县| 丘北县| 衡南县| 阿尔山市| 巴彦淖尔市| 余姚市| 彰化市| 册亨县| 仙居县| 蓬安县| 白朗县| 南和县| 陆丰市| 东乡| 临沂市| 英吉沙县| 乾安县| 习水县| 四平市| 兴安县| 东方市| 巴青县| 贺兰县| 喀喇沁旗| 丰城市| 怀安县| 平陆县| 象山县| 台南市| 康马县| 城口县| 西林县| 如皋市| 昌江| 阿图什市| 高要市| 女性| 北海市|