Catalogue » Books » Computers & Technology » Product details
Price comparison product image Kali Linux Wireless Penetration Testing Cookbook: Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Kali Linux Wireless Penetration Testing Cookbook: Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

New from:
US $35.90
Used from:
US $27.22
Shipping:
see website
Prices may incl. VAT *
Last refresh Aug/07/2018 01:03 AM
or
or
EAN
9781783554089
ISBN
1783554088

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes

Key FeaturesExpose wireless security threats through the eyes of an attacker,Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,Acquire and apply key wireless pentesting skills used by industry expertsBook Description

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux.

This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed.

By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.

What you will learnDeploy and configure a wireless cyber lab that resembles an enterprise production environmentInstall Kali Linux 2017.3 on your laptop and configure the wireless adapterLearn the fundamentals of commonly used wireless penetration testing techniquesScan and enumerate Wireless LANs and access pointsUse vulnerability scanning techniques to reveal flaws and weaknessesAttack Access Points to gain access to critical networksWho This Book Is For

If you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected.

Table of ContentsKali Linux and Wireless NetworkingAttacking Access ControlsIntegrity of WirelessImpacting ConfidentialityReducing availabilityAuthentication attacksBluetooth Attacks

Latest products for Price Comparison

* The prices and shipping costs may have changed since the last update. It is technically not possible to update the prices in real time. The time of purchase on the Website of the seller is used as the reference.