Mastering Wireless Penetration Testing for Highly Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals
Preview in Mapt
Code Files

Mastering Wireless Penetration Testing for Highly Secured Environments

Aaron Johns

1 customer reviews
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals
Mapt Subscription
FREE
$29.99/m after trial
eBook
$18.90
RRP $26.99
Save 29%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$18.90
$44.99
$29.99 p/m after trial
RRP $26.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Mastering Wireless Penetration Testing for Highly Secured Environments Book Cover
Mastering Wireless Penetration Testing for Highly Secured Environments
$ 26.99
$ 18.90
Metasploit Wireless Penetration Testing Book Cover
Metasploit Wireless Penetration Testing
$ 35.99
$ 25.20
Buy 2 for $35.00
Save $27.98
Add to Cart

Book Details

ISBN 139781782163183
Paperback220 pages

Book Description

Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.

This book covers how to set up Kali Linux, scan and sniff wireless networks, and crack WEP, WPA, and even WPA2 encryption. By the end of this book, you will feel much more confident when it comes to conducting wireless penetration tests, and you will have a full understanding of wireless security threats.

This book is full of hands-on demonstrations and how-to tutorials. This will benefit you, as the reader, when it comes to security awareness. Having some knowledge of wireless penetration testing would be helpful.

Table of Contents

Chapter 1: Preparing for an Effective Wireless Penetration Test
Benefits
What is Kali Linux?
Wireless penetration tools
Wireless terminologies
Summary
Chapter 2: Wireless Security Testing
Wireless penetration testing methodology
Wireless attacking techniques and methods
Prevention
Summary
Chapter 3: Footprinting and Reconnaissance
What is footprinting and reconnaissance?
Wireless network discovery
Wireless scanning
Sniffing wireless networks
Identifying your targets
Protecting/preventing yourself from attacks
Summary
Chapter 4: Penetrating Wireless Networks
Planning an attack
Wireless password cracking
Spoofing your MAC address
Protect yourself from wireless attacks
Summary
Chapter 5: Gaining Access to the Network
Identifying hosts
Determining the network size
Detecting vulnerable hosts
Preventing against threats
Summary
Chapter 6: Vulnerability Assessment
Planning an assessment
Setting up a vulnerability scanner
Running the vulnerability scanner
Generating reports
Resolving vulnerabilities
Summary
Chapter 7: Client-side Attacks
How client-side attacks work
Types of client-side attacks
Sniffing unencrypted traffic
Honeypot attacking
Karmetasploit
Jasager
Preventions
Summary
Chapter 8: Data Capture and Exploitation
Capturing unencrypted traffic
Man-in-the-middle attacks
Metasploit
Preventions
Summary
Chapter 9: Post-Exploitation
Creating a pivot
Documenting your penetration test
Cleaning up unnecessary work
Prevention
Summary
Chapter 10: Reporting
Planning the report
Writing the report
Finishing the report
Summary

What You Will Learn

  • Learn the wireless penetration testing methodology
  • Crack WEP, WPA, and WPA2 encrypted networks
  • Scan and sniff wireless networks for rogue access points and logins
  • Identify and detect vulnerable hosts
  • Run vulnerability scans and exploit systems
  • Learn to protect yourself from the latest wireless security threats
  • Pivot between networks and systems to access other hosts and networks

Authors

Table of Contents

Chapter 1: Preparing for an Effective Wireless Penetration Test
Benefits
What is Kali Linux?
Wireless penetration tools
Wireless terminologies
Summary
Chapter 2: Wireless Security Testing
Wireless penetration testing methodology
Wireless attacking techniques and methods
Prevention
Summary
Chapter 3: Footprinting and Reconnaissance
What is footprinting and reconnaissance?
Wireless network discovery
Wireless scanning
Sniffing wireless networks
Identifying your targets
Protecting/preventing yourself from attacks
Summary
Chapter 4: Penetrating Wireless Networks
Planning an attack
Wireless password cracking
Spoofing your MAC address
Protect yourself from wireless attacks
Summary
Chapter 5: Gaining Access to the Network
Identifying hosts
Determining the network size
Detecting vulnerable hosts
Preventing against threats
Summary
Chapter 6: Vulnerability Assessment
Planning an assessment
Setting up a vulnerability scanner
Running the vulnerability scanner
Generating reports
Resolving vulnerabilities
Summary
Chapter 7: Client-side Attacks
How client-side attacks work
Types of client-side attacks
Sniffing unencrypted traffic
Honeypot attacking
Karmetasploit
Jasager
Preventions
Summary
Chapter 8: Data Capture and Exploitation
Capturing unencrypted traffic
Man-in-the-middle attacks
Metasploit
Preventions
Summary
Chapter 9: Post-Exploitation
Creating a pivot
Documenting your penetration test
Cleaning up unnecessary work
Prevention
Summary
Chapter 10: Reporting
Planning the report
Writing the report
Finishing the report
Summary

Book Details

ISBN 139781782163183
Paperback220 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Kali Linux 2: Windows Penetration Testing Book Cover
Kali Linux 2: Windows Penetration Testing
$ 39.99
$ 28.00
Mastering Kali Linux Wireless Pentesting Book Cover
Mastering Kali Linux Wireless Pentesting
$ 39.99
$ 28.00
Kali Linux Wireless Penetration Testing: Beginner's Guide Book Cover
Kali Linux Wireless Penetration Testing: Beginner's Guide
$ 35.99
$ 25.20
Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition Book Cover
Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition
$ 35.99
$ 25.20
Mastering Modern Web Penetration Testing Book Cover
Mastering Modern Web Penetration Testing
$ 35.99
$ 25.20
Penetration Testing with Raspberry Pi Book Cover
Penetration Testing with Raspberry Pi
$ 17.99
$ 12.60