Wednesday, September 25, 2019

Mastering Kali Linux Wireless Pentesting (Free PDF)

File Size: 7.50 Mb

This book demonstrates how to perform a successful wireless assessment utilizing a selection of open source tools. Readers, from beginners to seasoned professionals, will gain an understanding of the tools and techniques used to discover, crack, and exploit wireless networks as well as learn how to extract sensitive information from the wireless traffic and the clients themselves. Wireless networks are nearly always in scope as part of a comprehensive security assessment and require special consideration and a different skill set than other aspects of the assessment. You will learn the language and technologies that differentiate 802.11 networks and be introduced to the specialized applications used to test them. This book is built around gaining hands-on experience with Kali Linux, and each chapter contains many step-by-step examples on the use and mastery of the wireless assessment tools included with this distribution.

Chapter 1: Wireless Penetration Testing Fundamentals
Chapter 2: Wireless Network Scanning
Chapter 3: Exploiting Wireless Devices
Chapter 4: Wireless Cracking
Chapter 5: Man-in-the-Middle Attacks
Chapter 6: Man-in-the-Middle Attacks Using Evil Twin Access Points
Chapter 7: Advanced Wireless Sniffing
Chapter 8: Denial of Service Attacks
Chapter 9: Wireless Pentesting from Non-Traditional Platforms

Author Details
"Brian Sak", CCIE #14441 (Security), is a 20-year information security veteran who currently works as a technical solutions architect for Cisco Systems. At Cisco Systems, he is engaged in solution development, and he consults with Cisco partners to help them build and improve their processes and services in the areas of big data analytics and digitization.

"Jilumudi Raghu Ram" is a security analyst with over 5 years of experience in the information security domain, with a strong knowledge of incident response, digital forensics, network security, infrastructure penetration testing, and Secure configuration audits.

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment