Overview
This book will take you through the basic concepts in Wireless and
creating a lab environment for your experiments to the business of
different lab sessions in wireless security basics, slowly turn on the
heat and move to more complicated scenarios, and finally end your
journey by conducting bleeding edge wireless attacks in your lab.
If you were ever curious about what wireless security and hacking was all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker.
Hands-on practical guide with a step-by-step approach to help you get started immediately with Wireless Penetration Testing
What you will learn from this book :
-Create a Wireless Lab for conducting experiments
-Monitor the air and sniff wireless packets
-Bypass WLAN authentication mechanism
-Crack WEP/WPA/WPA2 encryption mechanisms
-Break into a WLAN network using infrastructure flaws
-Break into a Wireless client such as a laptop
-Advanced attacks such as Man-in-the-Middle attacks and Evading WIPS
-Conduct wireless penetration test in a methodical way
Download
If you were ever curious about what wireless security and hacking was all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker.
Hands-on practical guide with a step-by-step approach to help you get started immediately with Wireless Penetration Testing
What you will learn from this book :
-Create a Wireless Lab for conducting experiments
-Monitor the air and sniff wireless packets
-Bypass WLAN authentication mechanism
-Crack WEP/WPA/WPA2 encryption mechanisms
-Break into a WLAN network using infrastructure flaws
-Break into a Wireless client such as a laptop
-Advanced attacks such as Man-in-the-Middle attacks and Evading WIPS
-Conduct wireless penetration test in a methodical way
Download
Chapter 1: Wireless Lab Setup
Chapter 2: WLAN and Its Inherent Insecurities
Chapter 3: Bypassing WLAN Authentication
Chapter 4: WLAN Encryption Flaws
Chapter 5: Attacks on the WLAN Infrastructure
Chapter 6: Attacking the Client
Chapter 7: Advanced WLAN Attacks
Chapter 8: Attacking WPA-Enterprise and RADIUS
Chapter 9: WLAN Penetration Testing Methodology
Appendix A: Conclusion and Road Ahead
Appendix B: Pop Quiz Answers
Index
Không có nhận xét nào:
Đăng nhận xét