LEADER 00000cam a2200709Ii 4500 001 944921872 003 OCoLC 005 20240129213017.0 006 m o d 007 cr unu|||||||| 008 160316s2016 enka o 001 0 eng d 015 GBC1J1661|2bnb 016 7 018010455|2Uk 019 942386980|a942843804|a960029048 020 9781785282850|q(electronic bk.) 020 1785282859|q(electronic bk.) 029 1 DEBBG|bBV043969012 029 1 DEBSZ|b485795256 029 1 GBVCP|b882753622 029 1 DEBSZ|b473885700 029 1 UKMGB|b018010455 035 (OCoLC)944921872|z(OCoLC)942386980|z(OCoLC)942843804 |z(OCoLC)960029048 037 CL0500000722|bSafari Books Online 040 UMI|beng|erda|epn|cUMI|dOCLCF|dKSU|dCOO|dDEBBG|dZ5A|dYDX |dYDXCP|dIDEBK|dDEBSZ|dOCLCQ|dUOK|dCEF|dN$T|dAGLDB|dIGB |dUKAHL|dRDF|dUKMGB|dOCLCO|dOCLCQ|dOCLCO|dOCLCL 049 INap 082 14 005.8 082 14 005.8|223 099 eBook O'Reilly for Public Libraries 100 1 Sak, Brian,|eauthor. 245 10 Mastering Kali Linux wireless pentesting :|btest your wireless network's security and master advanced wireless penetration techniques using Kali Linux /|cBrian Sak, Jilumudi Raghu Ram.|h[O'Reilly electronic resource] 264 1 Birmingham, UK :|bPackt Publishing,|c2016. 300 1 online resource (1 volume) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 490 1 Community experience distilled 500 Includes index. 505 0 Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Wireless Penetration Testing Fundamentals ; Wireless communication; Wireless standards; The 2.4 GHz spectrum; The 5 GHz spectrum; Choosing the right equipment; Supported wireless modes; Wireless adapters; Ralink RT3070; Atheros AR9271; Ralink RT3572; Antennas; Omnidirectional antennas; Patch antennas; Yagi antennas; Kali Linux for the Wireless Pentester; Downloading Virtual Box; Installing Virtual Box; Kali Linux deployment; Mapping the wireless adapter into Kali 505 8 Cross-Site Request ForgeryCVE-2014-5437; CVE-2014-8654; CVE-2013-2645; Remote code execution; CVE-2014-9134; Command injection; CVE-2008-1331; Denial of Service; OSVDB -102605; CVE-2009-3836; Information disclosure; CVE-2014- 6621; CVE-2014-6622; CVE-2015-0554; Attacking the services; Attacking Telnet; Attacking SSH; Attacking SNMP; CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure; CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure; Attacking SNMP; Attacking UPnP; Discovery; Description; Control; UPnP attacks; CVE- 2011-4500; CVE-2011-4499; CVE-2011-4501 505 8 CVE-2012-5960Checks on misconfiguration; Summary; Chapter 4: Wireless Cracking ; Overview of different wireless security protocols; Cracking WPA; WPA Personal; Cracking WPA2; Generating rainbow tables; Generating rainbow tables using genpmk; Generating rainbow tables using airolib-ng; Cracking WPS; Cracking 802.1x using hostapd; Summary; Chapter 5: Man-in-the-Middle Attacks ; MAC address Spoofing/ARP poisoning; Rogue DHCP server; Name resolution spoofing; DNS spoofing; Configuring Ettercap for DNS spoofing; NBNS spoofing; Summary 505 8 Chapter 6: Man-in-the-Middle Attacks Using Evil Twin Access Points Creating virtual access points with Hostapd; Creating virtual access points with airbase-ng; Session hijacking using Tamper Data; An example of session hijacking; Performing session hijacking using Tamper Data; Credential harvesting; Using Ettercap to spoof DNS; Hosting your fake web page; Web-based malware; Creating malicious payload using msfpayload; Hosting the malicious payload on SET; SSL stripping attack; Setting up SSLstrip; Browser AutoPwn; Setting up Metasploit's Browser Autopwn attack; Summary 520 Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux. 588 Description based on online resource; title from cover (viewed March 15, 2016). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 630 00 Kali Linux. 630 07 Kali Linux|2fast 650 0 Penetration testing (Computer security) 650 0 Computer networks|xSecurity measures. 650 6 Tests d'intrusion. 650 6 Réseaux d'ordinateurs|xSécurité|xMesures. 650 7 COMPUTERS / Security / Networking.|2bisacsh 650 7 Computer networks|xSecurity measures|2fast 650 7 Penetration testing (Computer security)|2fast 700 1 Ram, Jilumudi Raghu,|eauthor. 830 0 Community experience distilled. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781785285561/?ar |zAvailable on O'Reilly for Public Libraries 938 Askews and Holts Library Services|bASKH|nAH30413047 938 ProQuest MyiLibrary Digital eBook Collection|bIDEB |ncis34092116 938 YBP Library Services|bYANK|n12866637 938 EBSCOhost|bEBSC|n1191128 994 92|bJFN