Home » Step By Step Kali Linux and Wireless Hacking Basics, 2015 Edition by J. Benetti
Step By Step Kali Linux and Wireless Hacking Basics, 2015 Edition J. Benetti

Step By Step Kali Linux and Wireless Hacking Basics, 2015 Edition

J. Benetti

Published
ISBN :
Kindle Edition
111 pages
Enter the sum

 About the Book 

In this book you will learn how to set up a testing environment with multiple routers to learn real world tactics and hacks that wireless security professionals use every day. Including Man-in-the-Middle attacks, Reaver, WPA / WPA2 dictionaryMoreIn this book you will learn how to set up a testing environment with multiple routers to learn real world tactics and hacks that wireless security professionals use every day. Including Man-in-the-Middle attacks, Reaver, WPA / WPA2 dictionary attacks, Hydra and much more.Written for someone inexperienced with wireless penetration testing, Wireless Hacking Basics gives a step by step overview and look of installing Kali Linux and hacking wireless devices connected to a WEP or WPA / WPA2 encrypted router.Also includes:Setting up a Penetration Testing EnvironmentBasic Linux commandsInstalling Kali LinuxBooting from a DVDInstalling to the Hard DriveInstalling and Running with VMwareWEP HackingReaverWPA Dictionary AttackGetting a Handshake and a Data CaptureUsing Aircrack and a Dictionary to Crack a WPA Data CaptureCracking a WPA Capture with the GPU using HashCatCreating a Dictionary / Wordlist with CrunchRainbow TablesHacking into a android smartphone and taking controlSmartphones and Wireless Pen TestingUsing Hydra to gain access to admin login of a routerMan in the middle attacks (MitM) Ettercap and sslstripBypassing Mac address filteringUsing the built-in Kali wordlist rockyou.txtAdjusting wireless USB adapters transmit powerDual Band Routers