Amazon cover image
Image from Amazon.com

Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux / Brian Sak, Jilumudi Raghu Ram.

By: Contributor(s): Material type: TextTextSeries: Community experience distilledPublisher: Birmingham, UK : Packt Publishing, 2016Description: 1 online resource (1 volume) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781785282850
  • 1785282859
Subject(s): DDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59
Online resources:
Contents:
Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Wireless Penetration Testing Fundamentals ; Wireless communication; Wireless standards; The 2.4 GHz spectrum; The 5 GHz spectrum; Choosing the right equipment; Supported wireless modes; Wireless adapters; Ralink RT3070; Atheros AR9271; Ralink RT3572; Antennas; Omnidirectional antennas; Patch antennas; Yagi antennas; Kali Linux for the Wireless Pentester; Downloading Virtual Box; Installing Virtual Box; Kali Linux deployment; Mapping the wireless adapter into Kali
Cross-Site Request ForgeryCVE-2014-5437; CVE-2014-8654; CVE-2013-2645; Remote code execution; CVE-2014-9134; Command injection; CVE-2008-1331; Denial of Service; OSVDB-102605; CVE-2009-3836; Information disclosure; CVE-2014-6621; CVE-2014-6622; CVE-2015-0554; Attacking the services; Attacking Telnet; Attacking SSH; Attacking SNMP; CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure; CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure; Attacking SNMP; Attacking UPnP; Discovery; Description; Control; UPnP attacks; CVE-2011-4500; CVE-2011-4499; CVE-2011-4501
CVE-2012-5960Checks on misconfiguration; Summary; Chapter 4: Wireless Cracking ; Overview of different wireless security protocols; Cracking WPA; WPA Personal; Cracking WPA2; Generating rainbow tables; Generating rainbow tables using genpmk; Generating rainbow tables using airolib-ng; Cracking WPS; Cracking 802.1x using hostapd; Summary; Chapter 5: Man-in-the-Middle Attacks ; MAC address Spoofing/ARP poisoning; Rogue DHCP server; Name resolution spoofing; DNS spoofing; Configuring Ettercap for DNS spoofing; NBNS spoofing; Summary
Chapter 6: Man-in-the-Middle Attacks Using Evil Twin Access Points Creating virtual access points with Hostapd; Creating virtual access points with airbase-ng; Session hijacking using Tamper Data; An example of session hijacking; Performing session hijacking using Tamper Data; Credential harvesting; Using Ettercap to spoof DNS; Hosting your fake web page; Web-based malware; Creating malicious payload using msfpayload; Hosting the malicious payload on SET; SSL stripping attack; Setting up SSLstrip; Browser AutoPwn; Setting up Metasploit's Browser Autopwn attack; Summary
Summary: Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Description based on online resource; title from cover (viewed March 15, 2016).

Includes index.

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux.

Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Wireless Penetration Testing Fundamentals ; Wireless communication; Wireless standards; The 2.4 GHz spectrum; The 5 GHz spectrum; Choosing the right equipment; Supported wireless modes; Wireless adapters; Ralink RT3070; Atheros AR9271; Ralink RT3572; Antennas; Omnidirectional antennas; Patch antennas; Yagi antennas; Kali Linux for the Wireless Pentester; Downloading Virtual Box; Installing Virtual Box; Kali Linux deployment; Mapping the wireless adapter into Kali

Cross-Site Request ForgeryCVE-2014-5437; CVE-2014-8654; CVE-2013-2645; Remote code execution; CVE-2014-9134; Command injection; CVE-2008-1331; Denial of Service; OSVDB-102605; CVE-2009-3836; Information disclosure; CVE-2014-6621; CVE-2014-6622; CVE-2015-0554; Attacking the services; Attacking Telnet; Attacking SSH; Attacking SNMP; CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure; CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure; Attacking SNMP; Attacking UPnP; Discovery; Description; Control; UPnP attacks; CVE-2011-4500; CVE-2011-4499; CVE-2011-4501

CVE-2012-5960Checks on misconfiguration; Summary; Chapter 4: Wireless Cracking ; Overview of different wireless security protocols; Cracking WPA; WPA Personal; Cracking WPA2; Generating rainbow tables; Generating rainbow tables using genpmk; Generating rainbow tables using airolib-ng; Cracking WPS; Cracking 802.1x using hostapd; Summary; Chapter 5: Man-in-the-Middle Attacks ; MAC address Spoofing/ARP poisoning; Rogue DHCP server; Name resolution spoofing; DNS spoofing; Configuring Ettercap for DNS spoofing; NBNS spoofing; Summary

Chapter 6: Man-in-the-Middle Attacks Using Evil Twin Access Points Creating virtual access points with Hostapd; Creating virtual access points with airbase-ng; Session hijacking using Tamper Data; An example of session hijacking; Performing session hijacking using Tamper Data; Credential harvesting; Using Ettercap to spoof DNS; Hosting your fake web page; Web-based malware; Creating malicious payload using msfpayload; Hosting the malicious payload on SET; SSL stripping attack; Setting up SSLstrip; Browser AutoPwn; Setting up Metasploit's Browser Autopwn attack; Summary

Added to collection customer.56279.3

Powered by Koha