LiveZilla Live Chat Software
Register/Login Login Contact UsContacts BlogBlog
Cart Items : 0 | Cart Total : R0
Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Testing > 1783280417
  1. Kali Linux: Wireless Penetration Testing Beginner's Guide
    Image(s) provided for illustrative purposes and may differ from the actual product
  2. Kali Linux: Wireless Penetration Testing Beginner's Guide

    Delivery: 10-20 Working Days
    Customer Ratings (10 reviews)
    Price R755.00

Additional Information

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.

Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.

What you will learn

  • Create a wireless lab for your experiments
  • Sniff out wireless packets and hidden networks
  • Capture and crack WPA-2 keys
  • Discover hidden SSIDs
  • Explore the ins and outs of wireless technologies
  • Sniff probe requests and track users through SSID history
  • Attack radius authentication systems
  • Sniff wireless traffic and collect interesting data
  • Decrypt encrypted traffic with stolen keys

About the Authors

Vivek Ramachandran has been working in Wireless Security since 2003. He discovered the Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007 at DEF CON. In 2011, he was the first to demonstrate how malware could use Wi-Fi to create backdoors, worms, and even botnets. Earlier, he was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches and was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He is best known in the hacker community as the founder of, where he routinely posts videos on Wi-Fi Security and exploitation techniques.

Cameron Buchanan is an experienced penetration tester, having worked in a huge range of industries. He is also the author of Packt's Kali Linux CTF Blueprints.

Table of Contents

  1. Wireless Lab Setup
  2. WLAN and its Inherent Insecurities
  3. Bypassing WLAN Authentication
  4. WLAN Encryption Flaws
  5. Attacks on the WLAN Infrastructure
  6. Attacking the Client
  7. Advanced WLAN Attacks
  8. Attacking WPA-Enterprise and Radius
  9. WLAN Penetration Testing Methodology
  10. WPS and Probes

Similar Products

Basic Security Testing with Kali Linux 2The Hacker Playbook 2: Practical Guide To Penetration TestingIntermediate Security Testing with Kali Linux 2Rtfm: Red Team Field ManualMetasploit: The Penetration Tester's GuideKali Linux 2: Windows Penetration TestingHash Crack: Password Cracking ManualLearning Kali Linux: An Introduction to Penetration TestingKali Linux Network Scanning CookbookAlfa AWUS051NH 500mW High Gain 802.11a/b/g/n high power Wireless USB A / B / G / N Wireless WiFi Network adapter With a 5dBi and 9dBi Rubber Antenna and Suction cup / Clip Window Mount - High speed Up to 300 Mbps - With Hot Swap Support

Packt Publishing - ebooks Account
Packt Publishing - ebooks Account
black & white illustrations
black & white illustrations
Packt Publishing - ebooks Account
Packt Publishing - ebooks Account
Most Helpful Customer Reviews

As with most cookbooks, this one is a great example of how to do things correctly. Anyone can install an OS and since it boots, we believe that is running the properly. After I started to read the book, I noticed that I did not do nearly enough to hide / protect myself. This book with get you going from start to finish with what to do and more importantly why we should do it. I did learn a lot with this book and I would recommend it to anyone wanting to start-up with KALI Linux and grasp an fuller understanding of it.

I have always enjoyed Packt Publishing book and this one is also a hit !
Awesome book. My only complaint is that he sometimes lacks detail about what he's doing and why. Which is a common fault of writers, they assume you know whats going because they do. No we don't thats why we buy books.
I have just finished reading this book that I purchased through the Packt Publishing website. I cannot say enough good things about this book. A person with little to no prior knowledge of wireless penetration testing will walk away from this book with a very solid foundation of the topic. Everything is explained in a very comprehensive manner, and with the clarity to allow a novice to understand! I really admire Vivek Ramachandran's teaching skills. I have watched many of his SecurityTube videos and the enthusiasm with which he explains the material is very infectious. I enjoy his tutorials more than any other that I have watched on the web, they are truly a joy to watch! I can, without reservation, say that this feeling now extends to this book. I set up my own virtual lab and went through each and every exercise included in the book. If something did not work as expected it was due to an error on my part, which when corrected the exercise worked perfectly. I really appreciate the... Read more
Please Note

The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.

Please note that this item is imported from the USA, and is designed to be used in the USA. In addition, if the unit is powered it will come with a US plug and an adapter/transformer may be required. Please click here for more information on power requirements, or check with us if you are unsure or need any assistance!

Please also note that certain items cannot be imported, these include Alcohol, Animals, Batteries, Flammable Materials, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Seeds, Supplements, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, the item and information is displayed for reference purposes only. If you are not sure if we are permitted to bring an item, please send us an e-mail with a link to the item to confirm.

Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.