More Information
  • Explore the penetration testing methodology and its various phases
  • Install Kali Linux on your laptop and configure the wireless adapter
  • Scan and enumerate wireless LANs and point out their vulnerabilities
  • Understand the WEP security protocol and the techniques to crack the authentication keys and break it
  • Become proficient with the WPA/WPA2 protocol and use Kali Linux tools to attack it
  • Attack the access points and take control of the wireless network
  • Launch advanced attacks against clients
  • Produce stunning and effective reports

Kali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools.

This book introduces you to wireless penetration testing and describes how to conduct its various phases. After showing you how to install Kali Linux on your laptop, you will verify the requirements of the wireless adapter and configure it. Next, the book covers the wireless LAN reconnaissance phase, explains the WEP and WPA/WPA2 security protocols and demonstrates practical attacks against them using the tools provided in Kali Linux, Aircrack-ng in particular. You will then discover the advanced and latest attacks targeting access points and wireless clients and learn how to create a professionally written and effective report.

  • Learn the fundamentals of wireless LAN security and penetration testing
  • Discover and attack wireless networks using specialized Kali Linux tools
  • A step-by-step, practical guide to wireless penetration testing with hands-on examples
Page Count 164
Course Length 4 hours 55 minutes
ISBN 9781785280856
Date Of Publication 29 Jul 2015


Marco Alamanni

Marco Alamanni has professional experience working as a Linux system administrator and Information Security analyst in banks and financial institutions.

He holds a BSc in Computer Science and an MSc in Information Security. His interests in information technology include ethical hacking, digital forensics, malware analysis, Linux, and programming, among other things. He also collaborates with IT magazines to write articles about Linux and IT security.

He has used Kali Linux on various occasions to conduct incident response and forensics in his professional activity, besides using it for penetration testing purposes. He is also the author of “Kali Linux Wireless Penetration Testing Essentials” published by Packt Publishing.

 I would like to thank Packt Publishing for having offered me this exciting project and all the people I have worked with during its realization for their guide and support.

A big thank goes to my family, in general, and in particular to my wife Candice and my sons, Niccolò and Fabio Antonio, for their love and encouragement.

This course is dedicated to the memory of a dear and special person, Maria Vitteri, that will always remain in our thoughts and in our hearts.