Book Image

Kali Linux Wireless Penetration Testing Cookbook

By : Sean-Philip Oriyano
Book Image

Kali Linux Wireless Penetration Testing Cookbook

By: Sean-Philip Oriyano

Overview of this book

More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
Table of Contents (8 chapters)

Vulnerabilities in Bluetooth

The Bluetooth technology has shown itself both to be very convenient and powerful, but at the same time it has also shown that it has its own type of vulnerabilities that just aren't seen in other technologies, or at least not in the same form. Because of the way Bluetooth operates and is designed there is the definite possibility of new sorts of attacks, and some such have emerged within this environment.

Recently, a family of attacks known as BlueBorne has shown up in the marketplace. These are designed to target Bluetooth enabled capable devices. These attacks have proven to be quite disturbing and concerning as they rely on what amounts to a new communication mechanism rather than the old one. If we look at traditional attacks, these are spread over networking technologies to include the internet, hardwired networks and even Wi-Fi. However...