Mastering Wireless Penetration Testing for Highly Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

Mastering Wireless Penetration Testing for Highly Secured Environments

Aaron Johns

1 customer reviews
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals
Mapt Subscription
FREE
$29.99/m after trial
eBook
$18.90
RRP $26.99
Save 29%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$18.90
$44.99
$29.99p/m after trial
RRP $26.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781782163183
Paperback220 pages

Book Description

Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.

This book covers how to set up Kali Linux, scan and sniff wireless networks, and crack WEP, WPA, and even WPA2 encryption. By the end of this book, you will feel much more confident when it comes to conducting wireless penetration tests, and you will have a full understanding of wireless security threats.

This book is full of hands-on demonstrations and how-to tutorials. This will benefit you, as the reader, when it comes to security awareness. Having some knowledge of wireless penetration testing would be helpful.

Table of Contents

Chapter 1: Preparing for an Effective Wireless Penetration Test
Benefits
What is Kali Linux?
Wireless penetration tools
Wireless terminologies
Summary
Chapter 2: Wireless Security Testing
Wireless penetration testing methodology
Wireless attacking techniques and methods
Prevention
Summary
Chapter 3: Footprinting and Reconnaissance
What is footprinting and reconnaissance?
Wireless network discovery
Wireless scanning
Sniffing wireless networks
Identifying your targets
Protecting/preventing yourself from attacks
Summary
Chapter 4: Penetrating Wireless Networks
Planning an attack
Wireless password cracking
Spoofing your MAC address
Protect yourself from wireless attacks
Summary
Chapter 5: Gaining Access to the Network
Identifying hosts
Determining the network size
Detecting vulnerable hosts
Preventing against threats
Summary
Chapter 6: Vulnerability Assessment
Planning an assessment
Setting up a vulnerability scanner
Running the vulnerability scanner
Generating reports
Resolving vulnerabilities
Summary
Chapter 7: Client-side Attacks
How client-side attacks work
Types of client-side attacks
Sniffing unencrypted traffic
Honeypot attacking
Karmetasploit
Jasager
Preventions
Summary
Chapter 8: Data Capture and Exploitation
Capturing unencrypted traffic
Man-in-the-middle attacks
Metasploit
Preventions
Summary
Chapter 9: Post-Exploitation
Creating a pivot
Documenting your penetration test
Cleaning up unnecessary work
Prevention
Summary
Chapter 10: Reporting
Planning the report
Writing the report
Finishing the report
Summary

What You Will Learn

  • Learn the wireless penetration testing methodology
  • Crack WEP, WPA, and WPA2 encrypted networks
  • Scan and sniff wireless networks for rogue access points and logins
  • Identify and detect vulnerable hosts
  • Run vulnerability scans and exploit systems
  • Learn to protect yourself from the latest wireless security threats
  • Pivot between networks and systems to access other hosts and networks

Authors

Table of Contents

Chapter 1: Preparing for an Effective Wireless Penetration Test
Benefits
What is Kali Linux?
Wireless penetration tools
Wireless terminologies
Summary
Chapter 2: Wireless Security Testing
Wireless penetration testing methodology
Wireless attacking techniques and methods
Prevention
Summary
Chapter 3: Footprinting and Reconnaissance
What is footprinting and reconnaissance?
Wireless network discovery
Wireless scanning
Sniffing wireless networks
Identifying your targets
Protecting/preventing yourself from attacks
Summary
Chapter 4: Penetrating Wireless Networks
Planning an attack
Wireless password cracking
Spoofing your MAC address
Protect yourself from wireless attacks
Summary
Chapter 5: Gaining Access to the Network
Identifying hosts
Determining the network size
Detecting vulnerable hosts
Preventing against threats
Summary
Chapter 6: Vulnerability Assessment
Planning an assessment
Setting up a vulnerability scanner
Running the vulnerability scanner
Generating reports
Resolving vulnerabilities
Summary
Chapter 7: Client-side Attacks
How client-side attacks work
Types of client-side attacks
Sniffing unencrypted traffic
Honeypot attacking
Karmetasploit
Jasager
Preventions
Summary
Chapter 8: Data Capture and Exploitation
Capturing unencrypted traffic
Man-in-the-middle attacks
Metasploit
Preventions
Summary
Chapter 9: Post-Exploitation
Creating a pivot
Documenting your penetration test
Cleaning up unnecessary work
Prevention
Summary
Chapter 10: Reporting
Planning the report
Writing the report
Finishing the report
Summary

Book Details

ISBN 139781782163183
Paperback220 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Kali Linux - Assuring Security by Penetration Testing Book Cover
Kali Linux - Assuring Security by Penetration Testing
$ 26.99
$ 18.90
Mastering Kali Linux for Advanced Penetration Testing Book Cover
Mastering Kali Linux for Advanced Penetration Testing
$ 32.99
$ 23.10
Python for Secret Agents Book Cover
Python for Secret Agents
$ 16.99
$ 3.40
Web Penetration Testing with Kali Linux Book Cover
Web Penetration Testing with Kali Linux
$ 29.99
$ 21.00
Kali Linux Network Scanning Cookbook Book Cover
Kali Linux Network Scanning Cookbook
$ 30.99
$ 21.70
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Book Cover
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
$ 35.99
$ 7.20