Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless net...

Full description

Bibliographic Details
Main Author: Oriyano, Sean-Philip
Format: eBook
Language:English
Published: Birmingham, UK Packt Publishing 2017
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Cover
  • Title Page
  • Copyright
  • Credits
  • Disclaimer
  • About the Author
  • Acknowledgments
  • About the Reviewer
  • www.PacktPub.com
  • Customer Feedback
  • Dedication
  • Table of Contents
  • Preface
  • Chapter 1: Kali Linux and Wireless Networking
  • Introduction
  • Getting started with Kali
  • Installing Kali Linux
  • Getting ready
  • How to do it ...
  • Virtualized versus physical
  • Pre-installation checklist
  • Choosing an installation option
  • Hard drive selection
  • Network cards and wireless
  • Installing Kali Linux on a PC
  • Getting ready
  • How to do it ...
  • Installing Kali in a virtual environment
  • Getting ready
  • How to do it ...
  • Updating Kali Linux
  • How to do it ...
  • Preparing for wireless pentesting
  • How to do it ...
  • There's more ...
  • Bluetooth adapters
  • Chapter 2: Attacking Access Controls
  • Introduction
  • Types of access control attacks
  • Working with war driving
  • Getting ready
  • How to do it ...
  • Mapping access points and increasing accuracy
  • Getting ready
  • How to do it ...
  • Creating a rogue access point
  • Getting ready
  • How to do it ...
  • Evading MAC filtering with MAC spoofing
  • Getting ready
  • How to do it ...
  • Identifying promiscuous clients
  • Getting ready
  • How to do it ...
  • Chapter 3: Attacking Integrity Controls
  • Introduction
  • Types of attack
  • Sniffing on a wireless network
  • How does sniffing work?
  • Getting ready
  • How to do it ...
  • Working with monitor mode and packet injection
  • Getting ready
  • How to do it ...
  • Performing a data replay
  • Getting ready
  • How to do it ...
  • Cracking WEP
  • Getting ready
  • How to do it ...
  • Phase one
  • configuring monitor mode
  • Phase two
  • packet injection
  • Phase three
  • capturing IVs
  • Phase four
  • performing a fake authentication
  • Phase five
  • ARP replay mode
  • Phase six
  • obtaining the WEP key
  • Chapter 4: Attacking Confidentiality
  • Introduction
  • Types of attack
  • Creating an evil twin
  • Getting ready
  • How to do it ...
  • Step one
  • monitor mode airmon-ng
  • Step two
  • airdump-ng
  • Step three
  • create a new AP with the same SSID and MAC address
  • Step four
  • forcing a reconnect
  • Step five
  • power up
  • Man-in-the-middle with wireless
  • Getting ready
  • How to do it ...
  • Cracking WEP
  • Getting ready
  • Step one
  • monitor mode airmon-ng
  • Step two
  • airdump-ng
  • Step three
  • airdump-ng and traffic capture
  • Step four
  • replay that traffic
  • Step five
  • crack that traffic
  • Chapter 5: Attacking Availability
  • Introduction
  • Types of attack
  • Executing a deauthentication flood
  • Getting ready
  • How to do it ...
  • Detecting beacon frames
  • Getting ready
  • How to do it ...
  • Spoofing beacon frames
  • Getting ready
  • How to do it ...
  • Creating a beacon flood
  • Getting ready
  • ARP cache poisoning
  • Getting ready
  • Chapter 6: Authentication Attacks
  • Attacks against authentication
  • Types of attack
  • WEP attacks
  • Getting ready
  • How to do it ...
  • WPA and WPA2 attacks
  • Getting ready
  • How to do it ...
  • Attacking WPS
  • Getting ready
  • How to do it ...
  • Chapter 7: Bluetooth Attacks
  • Introduction
  • A brief history of Bluetooth
  • A look at the technology
  • Bluetooth in operation
  • Bluetooth protocol stack
  • Vulnerabilities in Bluetooth
  • Selecting the Bluetooth hardware
  • Types of attack
  • Bluesmacking
  • Getting ready
  • How to do it ...
  • Bluejacking
  • Getting ready
  • How to do it ...
  • Bluesnarfing
  • Getting ready
  • How to do it ...
  • Index