FirstCity
Welcome to First City University College Library iPortal | library@firstcity.edu.my | +603-7735 2088 (Ext. 519)
Amazon cover image
Image from Amazon.com

Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux / Brian Sak, Jilumudi Raghu Ram.

By: Contributor(s): Material type: TextTextSeries: Community experience distilledPublisher: Birmingham, UK : Packt Publishing, 2016Description: 1 online resource (1 volume) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781785282850
  • 1785282859
Subject(s): Genre/Form: DDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59
Online resources:
Contents:
Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Wireless Penetration Testing Fundamentals ; Wireless communication; Wireless standards; The 2.4 GHz spectrum; The 5 GHz spectrum; Choosing the right equipment; Supported wireless modes; Wireless adapters; Ralink RT3070; Atheros AR9271; Ralink RT3572; Antennas; Omnidirectional antennas; Patch antennas; Yagi antennas; Kali Linux for the Wireless Pentester; Downloading Virtual Box; Installing Virtual Box; Kali Linux deployment; Mapping the wireless adapter into Kali
Cross-Site Request ForgeryCVE-2014-5437; CVE-2014-8654; CVE-2013-2645; Remote code execution; CVE-2014-9134; Command injection; CVE-2008-1331; Denial of Service; OSVDB-102605; CVE-2009-3836; Information disclosure; CVE-2014-6621; CVE-2014-6622; CVE-2015-0554; Attacking the services; Attacking Telnet; Attacking SSH; Attacking SNMP; CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure; CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure; Attacking SNMP; Attacking UPnP; Discovery; Description; Control; UPnP attacks; CVE-2011-4500; CVE-2011-4499; CVE-2011-4501
CVE-2012-5960Checks on misconfiguration; Summary; Chapter 4: Wireless Cracking ; Overview of different wireless security protocols; Cracking WPA; WPA Personal; Cracking WPA2; Generating rainbow tables; Generating rainbow tables using genpmk; Generating rainbow tables using airolib-ng; Cracking WPS; Cracking 802.1x using hostapd; Summary; Chapter 5: Man-in-the-Middle Attacks ; MAC address Spoofing/ARP poisoning; Rogue DHCP server; Name resolution spoofing; DNS spoofing; Configuring Ettercap for DNS spoofing; NBNS spoofing; Summary
Chapter 6: Man-in-the-Middle Attacks Using Evil Twin Access Points Creating virtual access points with Hostapd; Creating virtual access points with airbase-ng; Session hijacking using Tamper Data; An example of session hijacking; Performing session hijacking using Tamper Data; Credential harvesting; Using Ettercap to spoof DNS; Hosting your fake web page; Web-based malware; Creating malicious payload using msfpayload; Hosting the malicious payload on SET; SSL stripping attack; Setting up SSLstrip; Browser AutoPwn; Setting up Metasploit's Browser Autopwn attack; Summary
Summary: Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Description based on online resource; title from cover (viewed March 15, 2016).

Includes index.

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux.

Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Wireless Penetration Testing Fundamentals ; Wireless communication; Wireless standards; The 2.4 GHz spectrum; The 5 GHz spectrum; Choosing the right equipment; Supported wireless modes; Wireless adapters; Ralink RT3070; Atheros AR9271; Ralink RT3572; Antennas; Omnidirectional antennas; Patch antennas; Yagi antennas; Kali Linux for the Wireless Pentester; Downloading Virtual Box; Installing Virtual Box; Kali Linux deployment; Mapping the wireless adapter into Kali

Cross-Site Request ForgeryCVE-2014-5437; CVE-2014-8654; CVE-2013-2645; Remote code execution; CVE-2014-9134; Command injection; CVE-2008-1331; Denial of Service; OSVDB-102605; CVE-2009-3836; Information disclosure; CVE-2014-6621; CVE-2014-6622; CVE-2015-0554; Attacking the services; Attacking Telnet; Attacking SSH; Attacking SNMP; CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure; CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure; Attacking SNMP; Attacking UPnP; Discovery; Description; Control; UPnP attacks; CVE-2011-4500; CVE-2011-4499; CVE-2011-4501

CVE-2012-5960Checks on misconfiguration; Summary; Chapter 4: Wireless Cracking ; Overview of different wireless security protocols; Cracking WPA; WPA Personal; Cracking WPA2; Generating rainbow tables; Generating rainbow tables using genpmk; Generating rainbow tables using airolib-ng; Cracking WPS; Cracking 802.1x using hostapd; Summary; Chapter 5: Man-in-the-Middle Attacks ; MAC address Spoofing/ARP poisoning; Rogue DHCP server; Name resolution spoofing; DNS spoofing; Configuring Ettercap for DNS spoofing; NBNS spoofing; Summary

Chapter 6: Man-in-the-Middle Attacks Using Evil Twin Access Points Creating virtual access points with Hostapd; Creating virtual access points with airbase-ng; Session hijacking using Tamper Data; An example of session hijacking; Performing session hijacking using Tamper Data; Credential harvesting; Using Ettercap to spoof DNS; Hosting your fake web page; Web-based malware; Creating malicious payload using msfpayload; Hosting the malicious payload on SET; SSL stripping attack; Setting up SSLstrip; Browser AutoPwn; Setting up Metasploit's Browser Autopwn attack; Summary

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide