|
Showing 1 - 6 of
6 matches in All Departments
Kali Linux Wireless Penetration Testing Beginner's Guide, Third
Edition presents wireless pentesting from the ground up, and has
been updated with the latest methodologies, including full coverage
of the KRACK attack. About This Book * Learn wireless penetration
testing with Kali Linux * Detect hidden wireless networks and
discover their names * Explore advanced Wi-Fi hacking techniques
including rogue access point hosting and probe sniffing * Develop
your encryption cracking skills and gain an insight into the
methods used by attackers and the underlying technologies that
facilitate these attacks Who This Book Is For Kali Linux Wireless
Penetration Testing Beginner's Guide, Third Edition is suitable for
anyone who wants to learn more about pentesting and how to
understand and defend against the latest wireless network attacks.
What You Will Learn * Understand the KRACK attack in full detail *
Create a wireless lab for your experiments * Sniff out wireless
packets, hidden networks, and SSIDs * Capture and crack WPA-2 keys
* Sniff probe requests and track users through their SSID history *
Attack radius authentication systems * Sniff wireless traffic and
collect interesting data * Decrypt encrypted traffic with stolen
keys In Detail As wireless networks become ubiquitous in our lives,
wireless penetration testing has become a key skill in the
repertoire of the professional penetration tester. This has been
highlighted again recently with the discovery of the KRACK attack
which enables attackers to potentially break into Wi-Fi networks
encrypted with WPA2. The Kali Linux security distribution comes
with a myriad of tools used for networking attacks and detecting
security loopholes. Kali Linux Wireless Penetration Testing
Beginner's Guide, Third Edition has been updated to Kali Linux
2017.3 with the latest methodologies, including full coverage of
the KRACK attack and how to defend against it. The book presents
wireless pentesting from the ground up, introducing all elements of
penetration testing with each new technology. You'll learn various
wireless testing methodologies by example, from the basics of
wireless routing and encryption through to detailed coverage of
hacking methods and attacks such as the Hirte and Caffe Latte.
Style and approach Kali Linux Wireless Penetration Testing
Beginner's Guide, Third Edition is a practical, hands-on guide to
modern wi-fi network hacking. It covers both the theory and
practice of wireless pentesting, offering detailed, real-world
coverage of the latest vulnerabilities and attacks.
Unleash the power of Python scripting to execute effective and
efficient penetration tests About This Book * Sharpen your
pentesting skills with Python * Develop your fluency with Python to
write sharper scripts for rigorous security testing * Get stuck
into some of the most powerful tools in the security world Who This
Book Is For If you are a Python programmer or a security researcher
who has basic knowledge of Python programming and wants to learn
about penetration testing with the help of Python, this course is
ideal for you. Even if you are new to the field of ethical hacking,
this course can help you find the vulnerabilities in your system so
that you are ready to tackle any kind of attack or intrusion. What
You Will Learn * Familiarize yourself with the generation of
Metasploit resource files and use the Metasploit Remote Procedure
Call to automate exploit generation and execution * Exploit the
Remote File Inclusion to gain administrative access to systems with
Python and other scripting languages * Crack an organization's
Internet perimeter and chain exploits to gain deeper access to an
organization's resources * Explore wireless traffic with the help
of various programs and perform wireless attacks with Python
programs * Gather passive information from a website using
automated scripts and perform XSS, SQL injection, and parameter
tampering attacks * Develop complicated header-based attacks
through Python In Detail Cybercriminals are always one step ahead,
when it comes to tools and techniques. This means you need to use
the same tools and adopt the same mindset to properly secure your
software. This course shows you how to do just that, demonstrating
how effective Python can be for powerful pentesting that keeps your
software safe. Comprising of three key modules, follow each one to
push your Python and security skills to the next level. In the
first module, we'll show you how to get to grips with the
fundamentals. This means you'll quickly find out how to tackle some
of the common challenges facing pentesters using custom Python
tools designed specifically for your needs. You'll also learn what
tools to use and when, giving you complete confidence when
deploying your pentester tools to combat any potential threat. In
the next module you'll begin hacking into the application layer.
Covering everything from parameter tampering, DDoS, XXS and SQL
injection, it will build on the knowledge and skills you learned in
the first module to make you an even more fluent security expert.
Finally in the third module, you'll find more than 60 Python
pentesting recipes. We think this will soon become your trusted
resource for any pentesting situation. This Learning Path combines
some of the best that Packt has to offer in one complete, curated
package. It includes content from the following Packt products: *
Learning Penetration Testing with Python by Christopher Duffy *
Python Penetration Testing Essentials by Mohit * Python Web
Penetration Testing Cookbook by Cameron Buchanan,Terry Ip, Andrew
Mabbitt, Benjamin May and Dave Mound Style and approach This course
provides a quick access to powerful, modern tools, and customizable
scripts to kick-start the creation of your own Python web
penetration testing toolbox.
Taking a highly practical approach and a playful tone, Kali Linux
CTF Blueprints provides step-by-step guides to setting up
vulnerabilities, in-depth guidance to exploiting them, and a
variety of advice and ideas to build and customize your own
challenges. If you are a penetration testing team leader or
individual who wishes to challenge yourself or your friends in the
creation of penetration testing assault courses, this is the book
for you. The book assumes a basic level of penetration skills and
familiarity with the Kali Linux operating system.
About This Book Learn wireless penetration testing with Kali Linux;
Backtrack's evolution Detect hidden wireless networks and discover
their names Explore advanced Wi-Fi hacking techniques including
rogue access point hosting and probe sniffing Develop your
encryption cracking skills and gain an insight into the methods
used by attackers and the underlying technologies that facilitate
these attacks Who This Book Is ForIf you are a security
professional, pentester, or anyone interested in getting to grips
with wireless penetration testing, this is the book for you. Some
familiarity with Kali Linux and wireless concepts is beneficial.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
|