Book Image

Kali Linux Wireless Penetration Testing Cookbook

By : Sean-Philip Oriyano
Book Image

Kali Linux Wireless Penetration Testing Cookbook

By: Sean-Philip Oriyano

Overview of this book

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Table of Contents (8 chapters)

Introduction

When working with any type of network or information one of the fundamental components that needs to be addressed is that of integrity. The integrity of data is essential as the receiver of a piece of information needs to have confidence that what they are receiving and relying on is faithful to the intent of the creator and sender of that data. If the integrity, and therefore confidence, in data is lost then data becomes essentially worthless.

If you have been in security long enough you have undoubtedly run into the well-known CIA triad, which is shorthand for Confidentiality, Integrity, and Availability. Simply put, the confidentiality refers to keeping information safe from unauthorized access or disclosure. Availability refers to the practice of keeping access to systems and data constant or near constant as possible (typically this is discussed in terms of uptime...