Aaron Johns - Mastering Wireless Penetration Testing for Highly Secured Environments [2015, PDF/ePub, ENG] 

Цитировать
Mastering Wireless Penetration Testing for Highly Secured Environments
Год издания: 2015
Автор: Aaron Johns
Издательство: Packt Publishing
ISBN: 9781782163183
Язык: Английский
Формат: PDF/ePub
Качество: Изначально компьютерное (eBook)
Интерактивное оглавление: Да
Количество страниц: 220
Описание: Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.
This book covers how to set up Kali Linux, scan and sniff wireless networks, and crack WEP, WPA, and even WPA2 encryption. By the end of this book, you will feel much more confident when it comes to conducting wireless penetration tests, and you will have a full understanding of wireless security threats.
This book is full of hands-on demonstrations and how-to tutorials. This will benefit you, as the reader, when it comes to security awareness. Having some knowledge of wireless penetration testing would be helpful.

Примеры страниц

Оглавление

1: Preparing for an Effective Wireless Penetration Test
Benefits
What is Kali Linux?
Wireless penetration tools
Wireless terminologies
Summary
2: Wireless Security Testing
Wireless penetration testing methodology
Wireless attacking techniques and methods
Prevention
Summary
3: Footprinting and Reconnaissance
What is footprinting and reconnaissance?
Wireless network discovery
Wireless scanning
Sniffing wireless networks
Identifying your targets
Protecting/preventing yourself from attacks
Summary
4: Penetrating Wireless Networks
Planning an attack
Wireless password cracking
Spoofing your MAC address
Protect yourself from wireless attacks
Summary
5: Gaining Access to the Network
Identifying hosts
Determining the network size
Detecting vulnerable hosts
Preventing against threats
Summary
6: Vulnerability Assessment
Planning an assessment
Setting up a vulnerability scanner
Running the vulnerability scanner
Generating reports
Resolving vulnerabilities
Summary
7: Client-side Attacks
How client-side attacks work
Types of client-side attacks
Sniffing unencrypted traffic
Honeypot attacking
Karmetasploit
Jasager
Preventions
Summary
8: Data Capture and Exploitation
Capturing unencrypted traffic
Man-in-the-middle attacks
Metasploit
Preventions
Summary
9: Post-Exploitation
Creating a pivot
Documenting your penetration test
Cleaning up unnecessary work
Prevention
Summary
10: Reporting
Planning the report
Writing the report
Finishing the report
Summary
Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете голосовать в опросах
Вы не можете прикреплять файлы к сообщениям
Вы можете скачивать файлы
Sitemap