LEADER 04822nmm a2200529 u 4500
001 EB001911968
003 EBX01000000000000001074870
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781785286063 
050 4 |a TK5105.59 
100 1 |a Fadyushin, Vyacheslav 
245 0 0 |a Building a pentesting lab for wireless networks  |b build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques  |c Vyacheslav Fadyushin, Andrey Popov 
260 |a Birmingham, UK  |b Packt Publishing  |c 2016 
300 |a 1 volume  |b illustrations 
505 0 |a Enterprise WLAN attacksSummary; Chapter 2: Planning Your Lab Environment ; Understanding what tasks your lab should fulfill; Objectives of a lab; Lab tasks; Network reconnaissance; Web application hacking; Hacking and researching network services; AD hacking; DBMS hacking; Network layer attacks; Wi-Fi penetration testing; Planning the network topology; Choosing appropriate components; Network devices; Server and workstation components; Planning lab security; Access control; Integrated security mechanisms; Security solutions; Security hints; Summary 
505 0 |a Chapter 3: Configuring Networking Lab Components General lab network communication rules; Configuring hardware wired devices; Preparing the console connection on Windows; Core switch; Initial configuration; Configuring interfaces and VLANs; Hardening the core switch; Configuring subinterfaces and subnets; Configuring auxiliary services; Basic gateway hardening; Configuring virtual wired network devices; Network virtualization platform; Software installation; Initial configuration; Network topology implementation; Switch; Gateway; Virtual host emulation; Wireless hardware devices 
505 0 |a Configuring WLANsGuest WLAN; Preparing the hardware access point; Summary; Chapter 4: Designing Application Lab Components ; Planning services; Creating virtual servers and workstations; VirtualBox overview and installation; Creating virtual machines; Configuring network settings of lab components; Installing and configuring domain services; Creating a domain; Creating users; Adding hosts to the domain; Certification authority services; Creating a root certificate; Creating a working certificate; Installing a root certificate; Installing a remote management service; Corporative e-mail service 
505 0 |a Configuring a DNS serverInstalling and configuring hMailServer; Installing vulnerable services; Installing web applications; Preparing a web server; WebGoat; DVWA; Liferay Portal; Metasploitable; Vulnerable VoIP server; Summary; Chapter 5: Implementing Security ; Network-based security solutions; Configuring network access control; Isolating external and guest networks; Isolating internal VLANs; Securing wireless access; Preparing the RADIUS server; Preparing the certificates; Configuring RADIUS; Configuring the access point; Configuring the WLAN client 
505 0 |a Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Wireless Network Security and Risks ; Understanding wireless environment and threats; An overview of wireless technologies; An overview of wireless threats; Wi-Fi media specifics; Common WLAN protection mechanisms and their flaws; Hiding SSID; MAC filtering; WEP; WPA/WPA2; Pre-shared key mode; Enterprise mode; WPS; Getting familiar with the Wi-Fi attack workflow; General Wi-Fi attack methodology; The active attacking phase; WPA-PSK attacks 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Réseaux locaux sans fil / Sécurité / Mesures 
653 |a Wireless LANs / Security measures / fast 
653 |a Computer networks / Security measures / fast 
653 |a Wireless LANs / Security measures 
653 |a Computers / Access control / fast 
653 |a Computers / Access control / http://id.loc.gov/authorities/subjects/sh85029553 
653 |a Computer security / Testing 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Ordinateurs / Accès / Contrôle 
653 |a COMPUTERS / Networking / Hardware / bisacsh 
653 |a COMPUTERS / Networking / Network Protocols / bisacsh 
700 1 |a Popov, Andrey  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a Community experience distilled 
500 |a Includes index 
015 |a GBB6K5774 
776 |z 9781785286063 
776 |z 9781785283154 
776 |z 1785283154 
776 |z 1785286064 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781785283154/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a Annotation