000 03253nmm a22003257a 4500
003 OSt
005 20240822144121.0
008 240822b |||||||| |||| 00| 0 eng d
020 _a9789355512758 (e-book)
040 _cCavite State University - Main Campus Library
_erda
041 _aeng
050 _aQA76.9
_bEl1 2023
100 _aEl Fiky, Ahmed Hashem
_948583
_eauthor
245 _aWireless penetration testing :
_bup and running /
_cby Ahmed Hashem El Fiky
260 _aLondon :
_bBPB Publications,
_c2023
300 _a1 online resource (303, pages) :
_bcolor illustrations.
336 _2rdacontent
_atext
337 _2rdamedia
_acomputer
338 _2rdacarrier
_aonline resource
500 _ahttps://portal.igpublish.com/iglibrary/ is required to read this e-book.
505 _a1. Wireless penetration testing lab setup -- 2. Wireless attacking techniques and methods -- 3. Wireless information gathering and foot printing -- 4. Wireless vulnerability research -- 5. Gain access to wireless network -- 6. Wireless vulnerability assessment -- 7. Client-side attacks -- 8. Advanced wireless attacks -- 9. Wireless post-exploitation -- 10. Android penetration testing -- 11. iOS penetration testing -- 12. Reporting
520 _aThis book satisfies any IT professional's desire to become a successful ethical hacker who is willing to be employed in identifying and exploiting flaws in the organization's network environment. This book explains in detail how to conduct wireless penetration tests using a wide variety of tools to simulate cyber attacks on both Android and iOS mobile devices and wireless networks. This book walks you through the steps of wireless penetration testing from start to finish. Once Kali Linux has been installed on your laptop, as demonstrated, you will check the system requirements and install the wireless adapter. The book then explores the wireless LAN reconnaissance phase, which outlines the WEP and WPA/WPA2 security protocols and shows real-world attacks against them using Kali Linux tools like Aircrack-ng. Then, the book discusses the most recent and sophisticated cyberattacks that target access points and wireless devices and how to prepare a compelling and professionally presented report. As a bonus, it removes myths, addresses misconceptions, and corrects common misunderstandings that can be detrimental to one's professional credentials. Tips and advice that are easy to implement and can increase their marketability as a pentester are also provided, allowing them to quickly advance toward a satisfying career in the field.
541 _aFund 164
_bCE-Logic
_cPurchased
_dFebruary 19, 2024
_eOEBP000498
_fP. Roderno
_hPHP 1,938.00
_p2024-02-0124
_q2024-1-113
650 0 _aInstruments and machines
_948124
650 0 _aCalculating machines
_948125
650 0 _a Electronic computers
_948126
856 _uhttps://portal.igpublish.com/iglibrary/obj/BPB0000381?searchid=1721007517810zXKlg2XvS3hT85yGnlnpS
_yClick here to read Full-Text E-Book
856 _uhttps://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform
_yLog-in to the website is required to read this e-book. Click here to request access.
942 _2lcc
_cOEB
999 _c64663
_d64663