更新时间:2021-07-02 22:06:14
封面
版权信息
Credits
Disclaimer
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Why subscribe?
Customer Feedback
Dedication
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
Kali Linux and Wireless Networking
Introduction
Getting started with Kali
Installing Kali Linux
How to do it...
Virtualized versus physical
Pre-installation checklist
Choosing an installation option
Hard drive selection
Network cards and wireless
Installing Kali Linux on a PC
Installing Kali in a virtual environment
Updating Kali Linux
Preparing for wireless pentesting
There's more...
Bluetooth adapters
Attacking Access Controls
Types of access control attacks
Working with war driving
Mapping access points and increasing accuracy
Creating a rogue access point
Evading MAC filtering with MAC spoofing
Identifying promiscuous clients
Attacking Integrity Controls
Types of attack
Sniffing on a wireless network
How does sniffing work?
Working with monitor mode and packet injection
Performing a data replay
Cracking WEP
Phase one – configuring monitor mode
Phase two – packet injection
Phase three – capturing IVs
Phase four – performing a fake authentication
Phase five – ARP replay mode
Phase six – obtaining the WEP key
Attacking Confidentiality
Creating an evil twin
Step one – monitor mode airmon-ng
Step two – airdump-ng
Step three – create a new AP with the same SSID and MAC address
Step four – forcing a reconnect