More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux.
This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed.
By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.
What you will learn:
Deploy and configure a wireless cyber lab that resembles an enterprise production environment
Install Kali Linux 2017.3 on your laptop and configure the wireless adapter
Learn the fundamentals of commonly used wireless penetration testing techniques
Scan and enumerate Wireless LANs and access points
Use vulnerability scanning techniques to reveal flaws and weaknesses
Attack Access Points to gain access to critical networks