Mastering Kali Linux Wireless Pentesting (notice n° 65640)

détails MARC
000 -LEADER
fixed length control field 03663cam a2200289zu 4500
003 - CONTROL NUMBER IDENTIFIER
control field FRCYB88843053
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250107220031.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250107s2016 fr | o|||||0|0|||eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781785285561
035 ## - SYSTEM CONTROL NUMBER
System control number FRCYB88843053
040 ## - CATALOGING SOURCE
Original cataloging agency FR-PaCSA
Language of cataloging en
Transcribing agency
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ram, Jilumudi Raghu
245 01 - TITLE STATEMENT
Title Mastering Kali Linux Wireless Pentesting
Statement of responsibility, etc. ['Ram, Jilumudi Raghu', 'Sak, Brian']
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer Packt Publishing
Date of production, publication, distribution, manufacture, or copyright notice 2016
300 ## - PHYSICAL DESCRIPTION
Extent p.
336 ## - CONTENT TYPE
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type code c
Source rdamdedia
338 ## - CARRIER TYPE
Carrier type code c
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Test your wireless network's security and master advanced wireless penetration techniques using Kali LinuxAbout This BookDevelop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networksPerform advanced wireless assessment and penetration testsUse Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali LinuxWho This Book Is ForIf you are an intermediate-level wireless security consultant in Kali Linux and want to be the go-to person for Kali Linux wireless security in your organisation, then this is the book for you. Basic understanding of the core Kali Linux concepts is expected.What You Will LearnFingerprint wireless networks with the various tools available in Kali LinuxLearn various techniques to exploit wireless access points using CSRFCrack WPA/WPA2/WPS and crack wireless encryption using Rainbow tables more quicklyPerform man-in-the-middle attack on wireless clientsUnderstand client-side attacks, browser exploits, Java vulnerabilities, and social engineeringDevelop advanced sniffing and PCAP analysis skills to extract sensitive information such as DOC, XLS, and PDF documents from wireless networksUse Raspberry PI and OpenWrt to perform advanced wireless attacksPerform a DOS test using various techniques and toolsIn DetailKali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit.This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux.You will begin by gaining an understanding of setting up and optimizing your penetration testing environment for wireless assessments. Then, the book will take you through a typical assessment from reconnaissance, information gathering, and scanning the network through exploitation and data extraction from your target. You will get to know various ways to compromise the wireless network using browser exploits, vulnerabilities in firmware, web-based attacks, client-side exploits, and many other hacking methods. You will also discover how to crack wireless networks with speed, perform man-in-the-middle and DOS attacks, and use Raspberry Pi and Android to expand your assessment methodology.By the end of this book, you will have mastered using Kali Linux for wireless security assessments and become a more effective penetration tester and consultant.Style and approachThis book uses a step-by-step approach using real-world attack scenarios to help you master the wireless penetration testing techniques.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Ram, Jilumudi Raghu
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Sak, Brian
856 40 - ELECTRONIC LOCATION AND ACCESS
Access method Cyberlibris
Uniform Resource Identifier <a href="https://international.scholarvox.com/netsen/book/88843053">https://international.scholarvox.com/netsen/book/88843053</a>
Electronic format type text/html
Host name

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025