KALI_LINUX_WIRELESS_PENETRATION_TESTING_BEGINNER.pdf

(13055 KB) Pobierz
Kali Linux Wireless Penetration
Testing Beginner's Guide
Master wireless testing techniques to survey and attack
wireless networks with Kali Linux
Vivek Ramachandran
Cameron Buchanan
BIRMINGHAM - MUMBAI
Kali Linux Wireless Penetration Testing Beginner's Guide
Copyright © 2015 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means, without the prior written permission of the
publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without
warranty, either express or implied. Neither the authors, nor Packt Publishing, and its
dealers and distributors will be held liable for any damages caused or alleged to be caused
directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the
companies and products mentioned in this book by the appropriate use of capitals.
However, Packt Publishing cannot guarantee the accuracy of this information.
First published: September 2011
Second edition: March 2015
Production reference: 1230315
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78328-041-4
www.packtpub.com
Credits
Authors
Vivek Ramachandran
Cameron Buchanan
Proofreaders
Reviewer
Marco Alamanni
Commissioning Editor
Erol Staveley
Acquisition Editor
Sam Wood
Content Development Editor
Shubhangi Dhamgaye
Technical Editor
Naveenkumar Jain
Copy Editor
Rashmi Sawant
Simran Bhogal
Stephen Copestake
Indexer
Monica Ajmera Mehta
Production Coordinator
Komal Ramchandani
Cover Work
Komal Ramchandani
Project Coordinator
Harshal Ved
About the Authors
Vivek Ramachandran
has been working on Wi-Fi Security since 2003. He discovered the
Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007
at DEF CON. In 2011, he was the first to demonstrate how malware could use Wi-Fi to
create backdoors, worms, and even botnets.
Earlier, he was one of the programmers of the 802.1x protocol and Port Security in Cisco's
6500 Catalyst series of switches and was also one of the winners of the Microsoft Security
Shootout contest held in India among a reported 65,000 participants. He is best known in
the hacker community as the founder of SecurityTube.net, where he routinely posts videos
on Wi-Fi Security, assembly language
,
exploitation techniques, and so on. SecurityTube.net
receives over 100,000 unique visitors a month.
Vivek's work on wireless security has been quoted in BBC Online, InfoWorld, MacWorld,
The Register, IT World Canada, and so on. This year, he will speak or train at a number
of security conferences, including Blackhat, Defcon, Hacktivity, 44con, HITB-ML, BruCON
Derbycon, Hashdays, SecurityZone, SecurityByte, and so on.
I would like to thank my lovely wife for all her help and support during the
book-writing process. I would also like to thank my parents, grandparents,
and sister for believing in me and encouraging me for all these years, and
last but not least, I would like to thank all the users of SecurityTube.net who
have always been behind me and supporting all my work. You guys rock!
Cameron Buchanan
is a penetration tester by trade and a writer in his spare time.
He has performed penetration tests around the world for a variety of clients across many
industries. Previously, he was a member of the RAF. He enjoys doing stupid things, such
as trying to make things fly, getting electrocuted, and dunking himself in freezing cold
water in his spare time. He is married and lives in London.
Zgłoś jeśli naruszono regulamin