feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV043048897
    Format: ix, 198 Seiten : , Diagramme.
    ISBN: 978-1-78439-293-2
    Note: Auf dem Cover: "Quick answers to common problems"
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 1-78439-990-6
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-78439-990-0
    Language: English
    Subjects: Computer Science
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9948319553202882
    Format: 1 online resource (190 pages) : , illustrations, tables.
    ISBN: 9781783985999 (e-book)
    Series Statement: Community Experience Distilled
    Additional Edition: Print version: Buchanan, Cameron. Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux. Birmingham, England : [Packt] Publishing, c2014 ISBN 9781783985982
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9948327922902882
    Format: 1 online resource (210 pages)
    Edition: Third edition.
    ISBN: 9781788622745 (e-book)
    Note: Includes index. , "Fully revised and updated to cover KRACK."--Cover.
    Additional Edition: Print version: Buchanan, Cameron. Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack. Birmingham, England ; Mumbai, [India] : Packt Publishing, 2017 ISBN 9781788831925
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_9959237849002883
    Format: 1 online resource (214 p.)
    Edition: Second edition.
    ISBN: 1-78328-042-5
    Content: If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.
    Note: "Learn by doing : less theory, more results." , Includes index. , Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Disclaimer; Table of Contents; Preface; Chapter 1: Wireless Lab Setup; Hardware requirements; Software requirements; Installing Kali; Time for action - installing Kali; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2: WLAN and its Inherent Insecurities; Revisiting WLAN frames , Time for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing management, control, and data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your adapter; The role of regulatory domains in wireless; Time for action - experimenting with your adapter; Summary; Chapter 3: Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters , Time for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4: WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrases; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks , Time for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5: Attacks on the WLAN Infrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access points; Denial of service attacks; Time for action - deauthentication DoS attacks; Evil twin and access point MAC spoofing; Time for action - evil twins and MAC spoofing; A rogue access point; Time for action - cracking WEP; Summary; Chapter 6: Attacking the Client; Honeypot and Mis-Association attacks , Time for action - orchestrating a Mis-Association attackThe Caffe Latte attack; Time for action - conducting a Caffe Latte attack; Deauthentication and disassociation attacks; Time for action - deauthenticating the client; The Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7: Advanced WLAN Attacks; A man-in-the-middle attack; Time for action - man-in-the-middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session hijacking over wireless , Time for action - session hijacking over wireless , English
    Additional Edition: ISBN 1-78328-041-7
    Additional Edition: ISBN 1-336-28860-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almafu_9959236632402883
    Format: 1 online resource (650 pages) : , illustrations (some color)
    Edition: 1st edition
    ISBN: 1-78712-097-X
    Series Statement: Learning path
    Content: Unleash the power of Python scripting to execute effective and efficient penetration tests About This Book Sharpen your pentesting skills with Python Develop your fluency with Python to write sharper scripts for rigorous security testing Get stuck into some of the most powerful tools in the security world Who This Book Is For If you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn Familiarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languages Crack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resources Explore wireless traffic with the help of various programs and perform wireless attacks with Python programs Gather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacks Develop complicated header-based attacks through Python In Detail Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. In the first module, we'll show you how to get to grips with the fundamentals. This means you'll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You'll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat. In the next module you'll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even mor...
    Note: Authors: Christopher Duffy [and six others]. Cf. Credits page.
    Additional Edition: ISBN 1-78712-818-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_9959402821802883
    Format: 1 online resource (210 pages)
    Edition: 3rd edition
    Content: Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. About This Book Learn wireless penetration testing with Kali Linux Detect hidden wireless networks and discover their names Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Who This Book Is For Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks. What You Will Learn Understand the KRACK attack in full detail Create a wireless lab for your experiments Sniff out wireless packets, hidden networks, and SSIDs Capture and crack WPA-2 keys Sniff probe requests and track users through their SSID history Attack radius authentication systems Sniff wireless traffic and collect interesting data Decrypt encrypted traffic with stolen keys In Detail As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. Style and approach Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is a practical, hands-on guide to modern wi-fi network hacking. It covers both the theory and practice of wireless pentesting, offering detailed, real-wor...
    Additional Edition: ISBN 1-78883-192-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages