Get Free Shipping on orders over $89
Kali Linux Wireless Penetration Testing Beginner's Guide : Master wireless testing techniques to survey and attack wireless networks with Kali Linux - Cameron Buchanan

Kali Linux Wireless Penetration Testing Beginner's Guide

Master wireless testing techniques to survey and attack wireless networks with Kali Linux

By: Cameron Buchanan, Vivek Ramachandran

Paperback | 30 March 2015

At a Glance

Paperback


$71.49

or 4 interest-free payments of $17.87 with

 or 

Ships in 5 to 7 business days

Master wireless testing techniques to survey and attack wireless networks with Kali Linux

Key Features

  • Learn wireless penetration testing with Kali Linux; Backtrack's evolution
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

What you will learn

  • Create a wireless lab for your experiments
  • Sniff out wireless packets and hidden networks
  • Capture and crack WPA-2 keys
  • Discover hidden SSIDs
  • Explore the ins and outs of wireless technologies
  • Sniff probe requests and track users through SSID history
  • Attack radius authentication systems
  • Sniff wireless traffic and collect interesting data
  • Decrypt encrypted traffic with stolen keys

More in Computer Security

Careless People : A story of where I used to work - Sarah Wynn-Williams

RRP $24.99

$21.75

13%
OFF
Supremacy : AI, ChatGPT and the Race that Will Change the World - Parmy Olson
Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Instagram & Facebook All-in-One For Dummies - Amanda Robinson