|
|
|
|
LEADER |
04822nmm a2200529 u 4500 |
001 |
EB001911968 |
003 |
EBX01000000000000001074870 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9781785286063
|
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Fadyushin, Vyacheslav
|
245 |
0 |
0 |
|a Building a pentesting lab for wireless networks
|b build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
|c Vyacheslav Fadyushin, Andrey Popov
|
260 |
|
|
|a Birmingham, UK
|b Packt Publishing
|c 2016
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a Enterprise WLAN attacksSummary; Chapter 2: Planning Your Lab Environment ; Understanding what tasks your lab should fulfill; Objectives of a lab; Lab tasks; Network reconnaissance; Web application hacking; Hacking and researching network services; AD hacking; DBMS hacking; Network layer attacks; Wi-Fi penetration testing; Planning the network topology; Choosing appropriate components; Network devices; Server and workstation components; Planning lab security; Access control; Integrated security mechanisms; Security solutions; Security hints; Summary
|
505 |
0 |
|
|a Chapter 3: Configuring Networking Lab Components General lab network communication rules; Configuring hardware wired devices; Preparing the console connection on Windows; Core switch; Initial configuration; Configuring interfaces and VLANs; Hardening the core switch; Configuring subinterfaces and subnets; Configuring auxiliary services; Basic gateway hardening; Configuring virtual wired network devices; Network virtualization platform; Software installation; Initial configuration; Network topology implementation; Switch; Gateway; Virtual host emulation; Wireless hardware devices
|
505 |
0 |
|
|a Configuring WLANsGuest WLAN; Preparing the hardware access point; Summary; Chapter 4: Designing Application Lab Components ; Planning services; Creating virtual servers and workstations; VirtualBox overview and installation; Creating virtual machines; Configuring network settings of lab components; Installing and configuring domain services; Creating a domain; Creating users; Adding hosts to the domain; Certification authority services; Creating a root certificate; Creating a working certificate; Installing a root certificate; Installing a remote management service; Corporative e-mail service
|
505 |
0 |
|
|a Configuring a DNS serverInstalling and configuring hMailServer; Installing vulnerable services; Installing web applications; Preparing a web server; WebGoat; DVWA; Liferay Portal; Metasploitable; Vulnerable VoIP server; Summary; Chapter 5: Implementing Security ; Network-based security solutions; Configuring network access control; Isolating external and guest networks; Isolating internal VLANs; Securing wireless access; Preparing the RADIUS server; Preparing the certificates; Configuring RADIUS; Configuring the access point; Configuring the WLAN client
|
505 |
0 |
|
|a Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Wireless Network Security and Risks ; Understanding wireless environment and threats; An overview of wireless technologies; An overview of wireless threats; Wi-Fi media specifics; Common WLAN protection mechanisms and their flaws; Hiding SSID; MAC filtering; WEP; WPA/WPA2; Pre-shared key mode; Enterprise mode; WPS; Getting familiar with the Wi-Fi attack workflow; General Wi-Fi attack methodology; The active attacking phase; WPA-PSK attacks
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Réseaux locaux sans fil / Sécurité / Mesures
|
653 |
|
|
|a Wireless LANs / Security measures / fast
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Wireless LANs / Security measures
|
653 |
|
|
|a Computers / Access control / fast
|
653 |
|
|
|a Computers / Access control / http://id.loc.gov/authorities/subjects/sh85029553
|
653 |
|
|
|a Computer security / Testing
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Ordinateurs / Accès / Contrôle
|
653 |
|
|
|a COMPUTERS / Networking / Hardware / bisacsh
|
653 |
|
|
|a COMPUTERS / Networking / Network Protocols / bisacsh
|
700 |
1 |
|
|a Popov, Andrey
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a Community experience distilled
|
500 |
|
|
|a Includes index
|
015 |
|
|
|a GBB6K5774
|
776 |
|
|
|z 9781785286063
|
776 |
|
|
|z 9781785283154
|
776 |
|
|
|z 1785283154
|
776 |
|
|
|z 1785286064
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781785283154/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Annotation
|