Kali Linux Wireless Penetration Testing Cookbook

Key FeaturesExpose wireless security threats through the eyes of an attacker,Recipes to help you proactively identify vulnerabilities and apply intelligent remidiation,Acquire and apply key wireless pentesting skills used by industry skillsBook DescriptionMore and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book will have recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking features of Kali Linux.This book will depict techniques associated with a wide range of wireless penetration tasks that include WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of identified findings. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident in conducting wireless penetration tests and protect yourself or your organization from wireless security threats.What you will learnDeploy and configure a Wireless Cyber Lab that resembles an Enterprise Production EnvironmentInstall Kali Linux 16.2 on your laptop and configure the wireless adapterLearn the fundamentals behind commonly used wireless penetration testing techniquesScan and enumerate Wireless LANs and access pointsUse vulnerability mapping techniques and validation of identified findingsAttack Wireless Access Points to gain access to critical networksAbout the AuthorSean Oriyano is a longtime security professional. Over the past 25 years he has divided his time between performing security research, consulting and delivering training both in the field of general IT and cyber security. In addition, he has become a best-selling author with many years experience in both digital and print media. Sean has published several books over the last decade and has expanded his reach further by appearing on TV and radio shows. Additionally Sean is a Chief Warrant Officer and Unit Commander specializing in cyber security training, development and strategy. As a CWO he is recognized as a SME in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.

Author: Sean Oriyano

Learn more