Book Image

Kali Linux Advanced Wireless Penetration Testing [Video]

By : Aubrey Love II, Vijay Kumar Velu
Book Image

Kali Linux Advanced Wireless Penetration Testing [Video]

By: Aubrey Love II, Vijay Kumar Velu

Overview of this book

<p>Kali Linux is a Debian-based Linux distribution designed primarily for Penetration Testing and Digital Forensics. It gives access to a large collection of security-related tools for professional security testing.</p> <p>In this course, you will be discussing the different variety of tools and techniques to find hidden wireless networks and Bluetooth devices. You will learn how to enumerate the wireless network, cracking passwords, getting connected to any vulnerable wireless network and Bluetooth device. All the exercise in this course will be hands-on throughout this training.</p> <p>The end goal of this course is to be able to connect, enumerate, extract information to any wireless-enabled device and network by utilizing various tools and software programs.</p> <h1>Style and Approach</h1> <p>This video course uses a step-by-step approach via real-world attack scenarios to help you master wireless penetration testing techniques.</p>
Table of Contents (6 chapters)
Chapter 4
Denial of Service Attacks
Content Locked
Section 3
Protocol-Based DoS
How does a protocol based Denial of Service is different from volume based and how easy is to launch this type of attack. - Utilise the inbuilt kali tools we would launch the attacks but measure in packets per second - Use hping3 to perform this attack on the target system - Launch multiple instances SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS