Kali Linux Wireless Penetration Testing Cookbook
Sean Philip Oriyano更新时间:2021-07-02 22:06:14
最新章节:How to do it...封面
版权信息
Credits
Disclaimer
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Why subscribe?
Customer Feedback
Dedication
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
Kali Linux and Wireless Networking
Introduction
Getting started with Kali
Installing Kali Linux
Getting ready
How to do it...
Virtualized versus physical
Pre-installation checklist
Choosing an installation option
Hard drive selection
Network cards and wireless
Installing Kali Linux on a PC
Getting ready
How to do it...
Installing Kali in a virtual environment
Getting ready
How to do it...
Updating Kali Linux
How to do it...
Preparing for wireless pentesting
How to do it...
There's more...
Bluetooth adapters
Attacking Access Controls
Introduction
Types of access control attacks
Working with war driving
Getting ready
How to do it...
Mapping access points and increasing accuracy
Getting ready
How to do it...
Creating a rogue access point
Getting ready
How to do it...
Evading MAC filtering with MAC spoofing
Getting ready
How to do it...
Identifying promiscuous clients
Getting ready
How to do it...
Attacking Integrity Controls
Introduction
Types of attack
Sniffing on a wireless network
How does sniffing work?
Getting ready
How to do it...
Working with monitor mode and packet injection
Getting ready
How to do it...
Performing a data replay
Getting ready
How to do it...
Cracking WEP
Getting ready
How to do it...
Phase one – configuring monitor mode
Phase two – packet injection
Phase three – capturing IVs
Phase four – performing a fake authentication
Phase five – ARP replay mode
Phase six – obtaining the WEP key
Attacking Confidentiality
Introduction
Types of attack
Creating an evil twin
Getting ready
How to do it...
Step one – monitor mode airmon-ng
Step two – airdump-ng
Step three – create a new AP with the same SSID and MAC address
Step four – forcing a reconnect
Step five – power up
Man-in-the-middle with wireless
Getting ready
How to do it...
Cracking WEP
Getting ready
Step one – monitor mode airmon-ng
Step two – airdump-ng
Step three – airdump-ng and traffic capture
Step four – replay that traffic
Step five – crack that traffic
Attacking Availability
Introduction
Types of attack
Executing a deauthentication flood
Getting ready
How to do it...
Detecting beacon frames
Getting ready
How to do it...
Spoofing beacon frames
Getting ready
How to do it...
Creating a beacon flood
Getting ready
ARP cache poisoning
Getting ready
Authentication Attacks
Attacks against authentication
Types of attack
WEP attacks
Getting ready
How to do it...
WPA and WPA2 attacks
Getting ready
How to do it...
Attacking WPS
Getting ready
How to do it...
Bluetooth Attacks
Introduction
A brief history of Bluetooth
A look at the technology
Bluetooth in operation
Bluetooth protocol stack
Vulnerabilities in Bluetooth
Selecting the Bluetooth hardware
Types of attack
Bluesmacking
Getting ready
How to do it...
Bluejacking
Getting ready
How to do it...
Bluesnarfing
Getting ready
How to do it...
更新时间:2021-07-02 22:06:14