Mastering Wireless Penetration Testing for Highly-Secured Environments Front Cover

Mastering Wireless Penetration Testing for Highly-Secured Environments

  • Length: 220 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2015-01-23
  • ISBN-10: 1782163182
  • ISBN-13: 9781782163183
  • Sales Rank: #3839673 (See Top 100 Books)
Description

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless networks
  • A hands-on guide teaching how to expose wireless security threats through the eyes of an attacker

Who This Book Is For

This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

In Detail

Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.

This book covers how to set up Kali Linux, scan and sniff wireless networks, and crack WEP, WPA, and even WPA2 encryption. By the end of this book, you will feel much more confident when it comes to conducting wireless penetration tests, and you will have a full understanding of wireless security threats.

This book is full of hands-on demonstrations and how-to tutorials. This will benefit you, as the reader, when it comes to security awareness. Having some knowledge of wireless penetration testing would be helpful.

Table of Contents

Chapter 1: Preparing for an Effective Wireless Penetration Test
Chapter 2: Wireless Security Testing
Chapter 3: Footprinting and Reconnaissance
Chapter 4: Penetrating Wireless Networks
Chapter 5: Gaining Access to the Network
Chapter 6: Vulnerability Assessment
Chapter 7: Client-side Attacks
Chapter 8: Data Capture and Exploitation
Chapter 9: Post-Exploitation
Chapter 10: Reporting

To access the link, solve the captcha.