官术网_书友最值得收藏!

Introduction

In today's world, one of the most common ways to share information is through the use of wireless communications. Wi-Fi is used in many locations, including the home, the workplace, airports, coffee shops, retail shops, and many other areas too numerous to name.

With the popularity of this type of communication, it is a forgone conclusion that there is a lot of valuable information that is traversing these networks. It is due to this information and the inherent weaknesses in these networks that they are common targets for those wishing to steal access, or information, or both.

In this book, our intention is twofold, with one objective being to introduce you to the tools in Kali Linux designed to audit wireless network, and the other to show some of the different attacks that are possible. This approach will serve to give you not only information on the attacks and how they work, but also give you valuable insight into reducing the likelihood or effectiveness of these attacks.

主站蜘蛛池模板: 灵璧县| 邵东县| 长顺县| 镇宁| 屏东市| 哈尔滨市| 阳谷县| 东明县| 怀仁县| 普兰县| 雷波县| 萝北县| 宣武区| 汉川市| 婺源县| 灵石县| 永平县| 宁国市| 兴海县| 利辛县| 云阳县| 桐庐县| 荔波县| 滦平县| 利川市| 芦山县| 辉南县| 龙川县| 南安市| 郧西县| 大埔区| 新巴尔虎左旗| 措勤县| 天镇县| 津市市| 尼木县| 介休市| 棋牌| 永嘉县| 大洼县| 包头市|