更新时间:2021-07-16 13:16:45
封面
版权信息
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Preface
Chapter 1. Introduction to Wireless Penetration Testing
Phases of penetration testing
Summary
Chapter 2. Setting Up Your Machine with Kali Linux
Introduction to the Kali Linux distribution
Installing Kali Linux
Wireless adapter setup and configuration
Chapter 3. WLAN Reconnaissance
Introduction to 802.11 standard and wireless LAN
Wireless LAN scanning
Wireless scanning with Kismet
Chapter 4. WEP Cracking
An introduction to WEP
WEP cracking with Aircrack-ng
Chapter 5. WPA/WPA2 Cracking
An introduction to WPA/WPA2
WPA cracking with the GPU
WPA cracking with automated tools
Chapter 6. Attacking Access Points and the Infrastructure
Attacks against Wi-Fi Protected Setup
Attacking WPA-Enterprise
Denial of Service attacks
Rogue access points
Attacking AP authentication credentials
Chapter 7. Wireless Client Attacks
Honeypot access points and Evil Twin attacks
Man-in-the-middle attacks
The Caffe Latte attack
The Hirte attack
Cracking WPA keys without the AP
Chapter 8. Reporting and Conclusions
The four stages of report writing
The report format
Conclusions
Appendix A. References
Chapter 1 – Introduction to Wireless Penetration Testing
Chapter 2 – Setting Up Your Machine with Kali Linux
Chapter 3 – WLAN Reconnaissance
Chapter 4 – WEP Cracking
Chapter 5 – WPA/WPA2 Cracking
Chapter 6 – Attacking Access Points and the Infrastructure
Chapter 7 – Wireless Client Attacks
Chapter 8 – Reporting and Conclusions
Index