Kali Linux Wireless Penetration Testing Essentials

Plan and execute penetration tests on wireless networks with the Kali Linux distribution

Kali Linux Wireless Penetration Testing Essentials

This ebook is included in a Mapt subscription
Marco Alamanni

1 customer reviews
Plan and execute penetration tests on wireless networks with the Kali Linux distribution
$10.00
$34.99
RRP $27.99
RRP $34.99
eBook
Print + eBook
Access every Packt eBook & Video for just $100
 
  • 4,000+ eBooks & Videos
  • 40+ New titles a month
  • 1 Free eBook/Video to keep every month
Find Out More
 
Code Files
Preview in Mapt

Book Details

ISBN 139781785280856
Paperback164 pages

Book Description

Kali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools.

This book introduces you to wireless penetration testing and describes how to conduct its various phases. After showing you how to install Kali Linux on your laptop, you will verify the requirements of the wireless adapter and configure it. Next, the book covers the wireless LAN reconnaissance phase, explains the WEP and WPA/WPA2 security protocols and demonstrates practical attacks against them using the tools provided in Kali Linux, Aircrack-ng in particular. You will then discover the advanced and latest attacks targeting access points and wireless clients and learn how to create a professionally written and effective report.

Table of Contents

Chapter 1: Introduction to Wireless Penetration Testing
Phases of penetration testing
Summary
Chapter 2: Setting Up Your Machine with Kali Linux
Introduction to the Kali Linux distribution
Installing Kali Linux
Wireless adapter setup and configuration
Summary
Chapter 3: WLAN Reconnaissance
Introduction to 802.11 standard and wireless LAN
Wireless LAN scanning
Wireless scanning with Kismet
Summary
Chapter 4: WEP Cracking
An introduction to WEP
WEP cracking with Aircrack-ng
Summary
Chapter 5: WPA/WPA2 Cracking
An introduction to WPA/WPA2
WPA cracking with the GPU
WPA cracking with automated tools
Summary
Chapter 6: Attacking Access Points and the Infrastructure
Attacks against Wi-Fi Protected Setup
Attacking WPA-Enterprise
Denial of Service attacks
Rogue access points
Attacking AP authentication credentials
Summary
Chapter 7: Wireless Client Attacks
Honeypot access points and Evil Twin attacks
Man-in-the-middle attacks
The Caffe Latte attack
The Hirte attack
Cracking WPA keys without the AP
Summary
Chapter 8: Reporting and Conclusions
The four stages of report writing
The report format
Summary
Conclusions

What You Will Learn

  • Explore the penetration testing methodology and its various phases
  • Install Kali Linux on your laptop and configure the wireless adapter
  • Scan and enumerate wireless LANs and point out their vulnerabilities
  • Understand the WEP security protocol and the techniques to crack the authentication keys and break it
  • Become proficient with the WPA/WPA2 protocol and use Kali Linux tools to attack it
  • Attack the access points and take control of the wireless network
  • Launch advanced attacks against clients
  • Produce stunning and effective reports

Authors

Table of Contents

Chapter 1: Introduction to Wireless Penetration Testing
Phases of penetration testing
Summary
Chapter 2: Setting Up Your Machine with Kali Linux
Introduction to the Kali Linux distribution
Installing Kali Linux
Wireless adapter setup and configuration
Summary
Chapter 3: WLAN Reconnaissance
Introduction to 802.11 standard and wireless LAN
Wireless LAN scanning
Wireless scanning with Kismet
Summary
Chapter 4: WEP Cracking
An introduction to WEP
WEP cracking with Aircrack-ng
Summary
Chapter 5: WPA/WPA2 Cracking
An introduction to WPA/WPA2
WPA cracking with the GPU
WPA cracking with automated tools
Summary
Chapter 6: Attacking Access Points and the Infrastructure
Attacks against Wi-Fi Protected Setup
Attacking WPA-Enterprise
Denial of Service attacks
Rogue access points
Attacking AP authentication credentials
Summary
Chapter 7: Wireless Client Attacks
Honeypot access points and Evil Twin attacks
Man-in-the-middle attacks
The Caffe Latte attack
The Hirte attack
Cracking WPA keys without the AP
Summary
Chapter 8: Reporting and Conclusions
The four stages of report writing
The report format
Summary
Conclusions

Book Details

ISBN 139781785280856
Paperback164 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Kali Linux 2: Windows Penetration Testing Book Cover
Kali Linux 2: Windows Penetration Testing
$ 39.99
$ 10.00