Kali Linux Wireless Penetration Testing Cookbook

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes
Preview in Mapt
Code Files

Kali Linux Wireless Penetration Testing Cookbook

Sean-Philip Oriyano

3 customer reviews
Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes
Mapt Subscription
FREE
$29.99/m after trial
eBook
$16.00
RRP $31.99
Save 49%
Print + eBook
$39.99
RRP $39.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$16.00
$39.99
$29.99 p/m after trial
RRP $31.99
RRP $39.99
Subscription
eBook
Print + eBook
Start 14 Day Trial

Frequently bought together


Kali Linux Wireless Penetration Testing Cookbook Book Cover
Kali Linux Wireless Penetration Testing Cookbook
$ 31.99
$ 16.00
Kali Linux Wireless Penetration Testing Beginner’s Guide - Third Edition Book Cover
Kali Linux Wireless Penetration Testing Beginner’s Guide - Third Edition
$ 27.99
$ 14.00
Buy 2 for $30.00
Save $29.98
Add to Cart

Book Details

ISBN 139781783554089
Paperback216 pages

Book Description

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux.

This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed.

By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.

Table of Contents

Chapter 1: Kali Linux and Wireless Networking
Introduction
Installing Kali Linux
Installing Kali Linux on a PC
Installing Kali in a virtual environment
Updating Kali Linux
Preparing for wireless pentesting
Chapter 2: Attacking Access Controls
Introduction
Working with war driving
Mapping access points and increasing accuracy
Creating a rogue access point
Evading MAC filtering with MAC spoofing
Identifying promiscuous clients
Chapter 3: Attacking Integrity Controls
Introduction
Sniffing on a wireless network
Working with monitor mode and packet injection
Performing a data replay
Cracking WEP
Chapter 4: Attacking Confidentiality
Introduction
Creating an evil twin
Man-in-the-middle with wireless
Cracking WEP
Chapter 5: Attacking Availability
Introduction
Executing a deauthentication flood
Detecting beacon frames
Spoofing beacon frames
Creating a beacon flood
ARP cache poisoning
Chapter 6: Authentication Attacks
Attacks against authentication
Types of attack
WEP attacks
WPA and WPA2 attacks
Attacking WPS
Chapter 7: Bluetooth Attacks
Introduction
A brief history of Bluetooth
Bluetooth in operation
Vulnerabilities in Bluetooth
Selecting the Bluetooth hardware
Types of attack
Bluesmacking
Bluejacking
Bluesnarfing

What You Will Learn

  • Deploy and configure a wireless cyber lab that resembles an enterprise production environment
  • Install Kali Linux 2017.3 on your laptop and configure the wireless adapter
  • Learn the fundamentals of commonly used wireless penetration testing techniques
  • Scan and enumerate Wireless LANs and access points
  • Use vulnerability scanning techniques to reveal flaws and weaknesses
  • Attack Access Points to gain access to critical networks

Authors

Table of Contents

Chapter 1: Kali Linux and Wireless Networking
Introduction
Installing Kali Linux
Installing Kali Linux on a PC
Installing Kali in a virtual environment
Updating Kali Linux
Preparing for wireless pentesting
Chapter 2: Attacking Access Controls
Introduction
Working with war driving
Mapping access points and increasing accuracy
Creating a rogue access point
Evading MAC filtering with MAC spoofing
Identifying promiscuous clients
Chapter 3: Attacking Integrity Controls
Introduction
Sniffing on a wireless network
Working with monitor mode and packet injection
Performing a data replay
Cracking WEP
Chapter 4: Attacking Confidentiality
Introduction
Creating an evil twin
Man-in-the-middle with wireless
Cracking WEP
Chapter 5: Attacking Availability
Introduction
Executing a deauthentication flood
Detecting beacon frames
Spoofing beacon frames
Creating a beacon flood
ARP cache poisoning
Chapter 6: Authentication Attacks
Attacks against authentication
Types of attack
WEP attacks
WPA and WPA2 attacks
Attacking WPS
Chapter 7: Bluetooth Attacks
Introduction
A brief history of Bluetooth
Bluetooth in operation
Vulnerabilities in Bluetooth
Selecting the Bluetooth hardware
Types of attack
Bluesmacking
Bluejacking
Bluesnarfing

Book Details

ISBN 139781783554089
Paperback216 pages
Read More
From 3 reviews

Read More Reviews

Recommended for You

Kali Linux Wireless Penetration Testing Beginner’s Guide - Third Edition Book Cover
Kali Linux Wireless Penetration Testing Beginner’s Guide - Third Edition
$ 27.99
$ 14.00
Digital Forensics with Kali Linux Book Cover
Digital Forensics with Kali Linux
$ 31.99
$ 16.00
Mastering Kali Linux for Advanced Penetration Testing - Second Edition Book Cover
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
$ 39.99
$ 20.00
Kali Linux - An Ethical Hacker's Cookbook Book Cover
Kali Linux - An Ethical Hacker's Cookbook
$ 35.99
$ 18.00
Kali Linux Cookbook - Second Edition Book Cover
Kali Linux Cookbook - Second Edition
$ 35.99
$ 18.00
Wireshark Revealed: Essential Skills for IT Professionals Book Cover
Wireshark Revealed: Essential Skills for IT Professionals
$ 79.99
$ 40.00