Mastering Wireless Penetration Testing for Highly-Secured Environments (Paperback)
內容描述
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals About This BookConduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systemsCrack WEP, WPA, and even WPA2 wireless networksA hands-on guide teaching how to expose wireless security threats through the eyes of an attacker Who This Book Is ForThis book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.What You Will Learn Learn the wireless penetration testing methodology Crack WEP, WPA, and WPA2 encrypted networks Scan and sniff wireless networks for rogue access points and logins Identify and detect vulnerable hosts Run vulnerability scans and exploit systems Learn to protect yourself from the latest wireless security threats Pivot between networks and systems to access other hosts and networks In DetailPenetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.This book covers how to set up Kali Linux, scan and sniff wireless networks, and crack WEP, WPA, and even WPA2 encryption. By the end of this book, you will feel much more confident when it comes to conducting wireless penetration tests, and you will have a full understanding of wireless security threats.This book is full of hands-on demonstrations and how-to tutorials. This will benefit you, as the reader, when it comes to security awareness. Having some knowledge of wireless penetration testing would be helpful.