Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cgm a22006737i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  c         
007    vz czazuu 
007    cr cnannnuuuuu 
008    220310s2022    xx 350        o   vleng d 
024 8  9781803239750 
029 1  AU@|b000073550644 
035    (OCoLC)1302759750 
037    9781803239750|bO'Reilly Media 
040    ORMDA|beng|erda|epn|cORMDA|dORMDA|dOCLCO|dOCLCF 
049    INap 
082 04 005.8 
082 04 005.8|223 
099    Streaming Video O’Reilly for Public Libraries 
245 00 Hacking WEP/WPA/WPA2 Wi-Fi networks using Kali Linux /
       |cSaad Sarraj.|h[O'Reilly electronic resource] 
250    [First edition]. 
264  1 [Place of publication not identified] :|bPackt Publishing,
       |c2022. 
300    1 online resource (1 video file (5 hr., 50 min.)) :|bsound,
       color. 
306    055000 
336    two-dimensional moving image|btdi|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
344    digital|2rdatr 
347    video file|2rdaft 
380    Instructional films|2lcgft 
500    "Updated in February 2022." 
511 0  Saad Sarraj, presenter. 
520    Learn to secure and crack WEP/WPA/WPA2 key and perform 
       MITM attack from scratch using Kali Linux About This Video
       Detect ARP Poisoning (MITM) attack to protect yourself 
       against it Crack any Wi-Fi encryption using several 
       methods Understand how to hack the connected clients In 
       Detail In this course, you will learn how to set up your 
       Kali Linux lab environment properly. In addition to that, 
       you will learn how devices communicate with each other. 
       Lastly, you will learn the best out of this course, which 
       is the Man in the Middle attacks. This course is divided 
       into six sections: - Preparation: In this section, you 
       will learn how to download and set up the latest version 
       of Kali Linux as a virtual machine or as your main OS. 
       This helps you create your own safe hacking lab 
       environment. - Network basics: Here you will learn the 
       basics of networks that will help you understand what 
       should be done before network security testing. - Gather 
       AP information before cracking: In this section, you will 
       learn how you can enumerate the target access point such 
       as ESSID-BSSID-Channel-Encryption type, and so on. You 
       will learn how you can disconnect, kick any client from 
       your target network, or even jam the wireless access point
       completely without having its password. - Cracking WEP/WPA
       /WPA2 encryption: After gathering information about the 
       target access point, it's time to learn how to crack WEP/
       WPA/WPA2 encryption keys and the theory behind each 
       attack. - MITM attack: In this section, you will learn how
       to perform man-in-the-middle attacks and what post-modules
       can be carried out on the target OS. Modules such as 
       playing music on the target OS, stealing credentials, and 
       many more. You will even learn how to gain full access to 
       the connected devices. Protecting yourself against these 
       attacks: After learning MITM attacks, it's time to learn 
       how to protect your OS against all the previously 
       mentioned attacks. By the end of the course, you will be 
       able to perform a MITM attack on the target network and 
       fully control all the connected computers. You will be 
       able to protect yourself from the MITM attack. Audience 
       This course is intended for beginners and professionals. 
       If you are a beginner, you will start from scratch until 
       you become a professional, and if you are a professional, 
       this course will enhance and refresh your knowledge about 
       wireless network hacking. This course is for people who 
       want to do penetration testing against a specific Wi-Fi 
       network. 
588 0  Online resource; title from title details screen (O'Reilly,
       viewed March 10, 2022). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
630 00 Kali Linux. 
630 07 Kali Linux.|2fast|0(OCoLC)fst01914587 
650  0 Penetration testing (Computer security) 
650  0 Computer security. 
650  2 Computer Security 
650  6 Tests d'intrusion. 
650  6 Sécurité informatique. 
650  7 Computer security.|2fast|0(OCoLC)fst00872484 
650  7 Penetration testing (Computer security)|2fast
       |0(OCoLC)fst01789566 
655  2 Webcast 
655  7 Instructional films.|2fast|0(OCoLC)fst01726236 
655  7 Internet videos.|2fast|0(OCoLC)fst01750214 
655  7 Nonfiction films.|2fast|0(OCoLC)fst01710269 
655  7 Instructional films.|2lcgft 
655  7 Nonfiction films.|2lcgft 
655  7 Internet videos.|2lcgft 
655  7 Films de formation.|2rvmgf 
655  7 Films autres que de fiction.|2rvmgf 
655  7 Vidéos sur Internet.|2rvmgf 
700 1  Sarraj, Saad,|epresenter. 
710 2  Packt Publishing,|epublisher. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/videos/~/9781803239750/?ar|zAvailable
       for O'Reilly for Public Libraries 
994    92|bJFN