Wireless Penetration Testing: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and IOS Application Security, and Break Wep

El Fiky, Ahmed Hashem

相關主題

商品描述

This book walks you through the steps of wireless penetration testing from start to finish. Once Kali Linux has been installed on your laptop, as demonstrated, you will check the system requirements and install the wireless adapter. The book then explores the wireless LAN reconnaissance phase, which outlines the WEP and WPA/WPA2 security protocols and shows real-world attacks against them using Kali Linux tools like Aircrack-ng. Then, the book discusses the most recent and sophisticated cyberattacks that target access points and wireless devices and how to prepare a compelling and professionally presented report.