Building a Pentesting Lab for Wireless Networks

Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
Preview in Mapt

Building a Pentesting Lab for Wireless Networks

Vyacheslav Fadyushin, Andrey Popov

Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques

Quick links: > What will you learn?> Table of content

eBook
$5.00
RRP $35.99
Save 86%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$5.00
$44.99
RRP $35.99
RRP $44.99
eBook
Print + eBook

Frequently bought together


Building a Pentesting Lab for Wireless Networks Book Cover
Building a Pentesting Lab for Wireless Networks
$ 35.99
$ 5.00
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition Book Cover
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
$ 47.99
$ 5.00
Buy 2 for $10.00
Save $73.98
Add to Cart

Book Details

ISBN 139781785283154
Paperback264 pages

Book Description

Starting with the basics of wireless networking and its associated risks, we will guide you through the stages of creating a penetration testing lab with wireless access and preparing your wireless penetration testing machine.

This book will guide you through configuring hardware and virtual network devices, filling the lab network with applications and security solutions, and making it look and work like a real enterprise network. The resulting lab protected with WPA-Enterprise will let you practice most of the attack techniques used in penetration testing projects. Along with a review of penetration testing frameworks, this book is also a detailed manual on preparing a platform for wireless penetration testing. By the end of this book, you will be at the point when you can practice, and research without worrying about your lab environment for every task.

Table of Contents

Chapter 1: Understanding Wireless Network Security and Risks
Understanding wireless environment and threats
Common WLAN protection mechanisms and their flaws
Getting familiar with the Wi-Fi attack workflow
Summary
Chapter 2: Planning Your Lab Environment
Understanding what tasks your lab should fulfill
Planning the network topology
Choosing appropriate components
Planning lab security
Security hints
Summary
Chapter 3: Configuring Networking Lab Components
General lab network communication rules
Configuring hardware wired devices
Configuring virtual wired network devices
Configuring WLANs
Summary
Chapter 4: Designing Application Lab Components
Planning services
Creating virtual servers and workstations
Installing and configuring domain services
Certification authority services
Installing a remote management service
Corporative e-mail service
Installing vulnerable services
Installing web applications
Summary
Chapter 5: Implementing Security
Network-based security solutions
Host-based security solutions
SIEM
Summary
Chapter 6: Exploring Hacking Toolkits
Wireless hacking tools
Infrastructure hacking tools
Cracking tools
Web application hacking tools
Summary
Chapter 7: Preparing a Wireless Penetration Testing Platform
Common variants of the pentesting platform
Choosing an interface
Installing the necessary software
Preparing configs and scripts
Preparing a Kali USB stick
Summary
Chapter 8: What's Next?
What you can learn
Courses and certificates
Pentesting standards
Information sources
Summary

What You Will Learn

  • Determine your needs and choose the appropriate lab components for them
  • Build a virtual or hardware lab network
  • Imitate an enterprise network and prepare intentionally vulnerable software and services
  • Secure wired and wireless access to your lab
  • Choose a penetration testing framework according to your needs
  • Arm your own wireless hacking platform
  • Get to know the methods to create a strong defense mechanism for your system

Authors

Table of Contents

Chapter 1: Understanding Wireless Network Security and Risks
Understanding wireless environment and threats
Common WLAN protection mechanisms and their flaws
Getting familiar with the Wi-Fi attack workflow
Summary
Chapter 2: Planning Your Lab Environment
Understanding what tasks your lab should fulfill
Planning the network topology
Choosing appropriate components
Planning lab security
Security hints
Summary
Chapter 3: Configuring Networking Lab Components
General lab network communication rules
Configuring hardware wired devices
Configuring virtual wired network devices
Configuring WLANs
Summary
Chapter 4: Designing Application Lab Components
Planning services
Creating virtual servers and workstations
Installing and configuring domain services
Certification authority services
Installing a remote management service
Corporative e-mail service
Installing vulnerable services
Installing web applications
Summary
Chapter 5: Implementing Security
Network-based security solutions
Host-based security solutions
SIEM
Summary
Chapter 6: Exploring Hacking Toolkits
Wireless hacking tools
Infrastructure hacking tools
Cracking tools
Web application hacking tools
Summary
Chapter 7: Preparing a Wireless Penetration Testing Platform
Common variants of the pentesting platform
Choosing an interface
Installing the necessary software
Preparing configs and scripts
Preparing a Kali USB stick
Summary
Chapter 8: What's Next?
What you can learn
Courses and certificates
Pentesting standards
Information sources
Summary

Book Details

ISBN 139781785283154
Paperback264 pages
Read More

Read More Reviews

Recommended for You

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition Book Cover
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
$ 47.99
$ 5.00
Mastering Kali Linux Wireless Pentesting Book Cover
Mastering Kali Linux Wireless Pentesting
$ 39.99
$ 5.00
Mastering Metasploit - Second Edition Book Cover
Mastering Metasploit - Second Edition
$ 39.99
$ 5.00
Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition Book Cover
Kali Linux 2 - Assuring Security by Penetration Testing - Third Edition
$ 35.99
$ 5.00
Learning Linux Binary Analysis Book Cover
Learning Linux Binary Analysis
$ 35.99
$ 5.00
Python: Penetration Testing for Developers Book Cover
Python: Penetration Testing for Developers
$ 67.99
$ 5.00