Kali linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes About This Book Expose wireless security threats through the eyes of an attacker, Recipes to help you proactively identify vulnerabilities and apply intelligent remediation, Acquire and apply key wireless pen...

Descripción completa

Detalles Bibliográficos
Otros Autores: Oriyano, Sean-Philip, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, [England] ; Mumbai, [India] : Packt Publishing 2017.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630084706719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright
  • Credits
  • Disclaimer
  • About the Author
  • Acknowledgments
  • About the Reviewer
  • www.PacktPub.com
  • Customer Feedback
  • Dedication
  • Table of Contents
  • Preface
  • Chapter 1: Kali Linux and Wireless Networking
  • Introduction
  • Getting started with Kali
  • Installing Kali Linux
  • Getting ready
  • How to do it...
  • Virtualized versus physical
  • Pre-installation checklist
  • Choosing an installation option
  • Hard drive selection
  • Network cards and wireless
  • Installing Kali Linux on a PC
  • Getting ready
  • How to do it...
  • Installing Kali in a virtual environment
  • Getting ready
  • How to do it...
  • Updating Kali Linux
  • How to do it...
  • Preparing for wireless pentesting
  • How to do it...
  • There's more...
  • Bluetooth adapters
  • Chapter 2: Attacking Access Controls
  • Introduction
  • Types of access control attacks
  • Working with war driving
  • Getting ready
  • How to do it...
  • Mapping access points and increasing accuracy
  • Getting ready
  • How to do it...
  • Creating a rogue access point
  • Getting ready
  • How to do it...
  • Evading MAC filtering with MAC spoofing
  • Getting ready
  • How to do it...
  • Identifying promiscuous clients
  • Getting ready
  • How to do it...
  • Chapter 3: Attacking Integrity Controls
  • Introduction
  • Types of attack
  • Sniffing on a wireless network
  • How does sniffing work?
  • Getting ready
  • How to do it...
  • Working with monitor mode and packet injection
  • Getting ready
  • How to do it...
  • Performing a data replay
  • Getting ready
  • How to do it...
  • Cracking WEP
  • Getting ready
  • How to do it...
  • Phase one - configuring monitor mode
  • Phase two - packet injection
  • Phase three - capturing IVs
  • Phase four - performing a fake authentication
  • Phase five - ARP replay mode
  • Phase six - obtaining the WEP key.
  • Chapter 4: Attacking Confidentiality
  • Introduction
  • Types of attack
  • Creating an evil twin
  • Getting ready
  • How to do it...
  • Step one - monitor mode airmon-ng
  • Step two - airdump-ng
  • Step three - create a new AP with the same SSID and MAC address
  • Step four - forcing a reconnect
  • Step five - power up
  • Man-in-the-middle with wireless
  • Getting ready
  • How to do it...
  • Cracking WEP
  • Getting ready
  • Step one - monitor mode airmon-ng
  • Step two - airdump-ng
  • Step three - airdump-ng and traffic capture
  • Step four - replay that traffic
  • Step five - crack that traffic
  • Chapter 5: Attacking Availability
  • Introduction
  • Types of attack
  • Executing a deauthentication flood
  • Getting ready
  • How to do it...
  • Detecting beacon frames
  • Getting ready
  • How to do it...
  • Spoofing beacon frames
  • Getting ready
  • How to do it...
  • Creating a beacon flood
  • Getting ready
  • ARP cache poisoning
  • Getting ready
  • Chapter 6: Authentication Attacks
  • Attacks against authentication
  • Types of attack
  • WEP attacks
  • Getting ready
  • How to do it...
  • WPA and WPA2 attacks
  • Getting ready
  • How to do it...
  • Attacking WPS
  • Getting ready
  • How to do it...
  • Chapter 7: Bluetooth Attacks
  • Introduction
  • A brief history of Bluetooth
  • A look at the technology
  • Bluetooth in operation
  • Bluetooth protocol stack
  • Vulnerabilities in Bluetooth
  • Selecting the Bluetooth hardware
  • Types of attack
  • Bluesmacking
  • Getting ready
  • How to do it...
  • Bluejacking
  • Getting ready
  • How to do it...
  • Bluesnarfing
  • Getting ready
  • How to do it...
  • Index.