Mastering Wireless Penetration Testing for Highly Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

Mastering Wireless Penetration Testing for Highly Secured Environments

This ebook is included in a Mapt subscription
Aaron Johns

1 customer reviews
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals
$26.99
$44.99
RRP $26.99
RRP $44.99
eBook
Print + eBook
Subscribe and access every Packt eBook & Video.
 
  • 4,000+ eBooks & Videos
  • 40+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781782163183
Paperback220 pages

Book Description

Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.

This book covers how to set up Kali Linux, scan and sniff wireless networks, and crack WEP, WPA, and even WPA2 encryption. By the end of this book, you will feel much more confident when it comes to conducting wireless penetration tests, and you will have a full understanding of wireless security threats.

This book is full of hands-on demonstrations and how-to tutorials. This will benefit you, as the reader, when it comes to security awareness. Having some knowledge of wireless penetration testing would be helpful.

Table of Contents

Chapter 1: Preparing for an Effective Wireless Penetration Test
Benefits
What is Kali Linux?
Wireless penetration tools
Wireless terminologies
Summary
Chapter 2: Wireless Security Testing
Wireless penetration testing methodology
Wireless attacking techniques and methods
Prevention
Summary
Chapter 3: Footprinting and Reconnaissance
What is footprinting and reconnaissance?
Wireless network discovery
Wireless scanning
Sniffing wireless networks
Identifying your targets
Protecting/preventing yourself from attacks
Summary
Chapter 4: Penetrating Wireless Networks
Planning an attack
Wireless password cracking
Spoofing your MAC address
Protect yourself from wireless attacks
Summary
Chapter 5: Gaining Access to the Network
Identifying hosts
Determining the network size
Detecting vulnerable hosts
Preventing against threats
Summary
Chapter 6: Vulnerability Assessment
Planning an assessment
Setting up a vulnerability scanner
Running the vulnerability scanner
Generating reports
Resolving vulnerabilities
Summary
Chapter 7: Client-side Attacks
How client-side attacks work
Types of client-side attacks
Sniffing unencrypted traffic
Honeypot attacking
Karmetasploit
Jasager
Preventions
Summary
Chapter 8: Data Capture and Exploitation
Capturing unencrypted traffic
Man-in-the-middle attacks
Metasploit
Preventions
Summary
Chapter 9: Post-Exploitation
Creating a pivot
Documenting your penetration test
Cleaning up unnecessary work
Prevention
Summary
Chapter 10: Reporting
Planning the report
Writing the report
Finishing the report
Summary

What You Will Learn

  • Learn the wireless penetration testing methodology
  • Crack WEP, WPA, and WPA2 encrypted networks
  • Scan and sniff wireless networks for rogue access points and logins
  • Identify and detect vulnerable hosts
  • Run vulnerability scans and exploit systems
  • Learn to protect yourself from the latest wireless security threats
  • Pivot between networks and systems to access other hosts and networks

Authors

Table of Contents

Chapter 1: Preparing for an Effective Wireless Penetration Test
Benefits
What is Kali Linux?
Wireless penetration tools
Wireless terminologies
Summary
Chapter 2: Wireless Security Testing
Wireless penetration testing methodology
Wireless attacking techniques and methods
Prevention
Summary
Chapter 3: Footprinting and Reconnaissance
What is footprinting and reconnaissance?
Wireless network discovery
Wireless scanning
Sniffing wireless networks
Identifying your targets
Protecting/preventing yourself from attacks
Summary
Chapter 4: Penetrating Wireless Networks
Planning an attack
Wireless password cracking
Spoofing your MAC address
Protect yourself from wireless attacks
Summary
Chapter 5: Gaining Access to the Network
Identifying hosts
Determining the network size
Detecting vulnerable hosts
Preventing against threats
Summary
Chapter 6: Vulnerability Assessment
Planning an assessment
Setting up a vulnerability scanner
Running the vulnerability scanner
Generating reports
Resolving vulnerabilities
Summary
Chapter 7: Client-side Attacks
How client-side attacks work
Types of client-side attacks
Sniffing unencrypted traffic
Honeypot attacking
Karmetasploit
Jasager
Preventions
Summary
Chapter 8: Data Capture and Exploitation
Capturing unencrypted traffic
Man-in-the-middle attacks
Metasploit
Preventions
Summary
Chapter 9: Post-Exploitation
Creating a pivot
Documenting your penetration test
Cleaning up unnecessary work
Prevention
Summary
Chapter 10: Reporting
Planning the report
Writing the report
Finishing the report
Summary

Book Details

ISBN 139781782163183
Paperback220 pages
Read More
From 1 reviews

Read More Reviews