Book Reviews

Ebook: Kali Linux Wireless Penetration Testing: Beginner’s Guide

Kali Linux: Wireless Penetration Testing Beginner's Guide
Written by Martins D. Okoi

The Linux environment is the ideal platform for security auditors and penetration testers because of the enormous artillery it provides them with.

Take Kali Linux for example, the Debian-based Linux distro born 10 years ago that is specially designed for digital forensics and penetration testing comes with a ton of prepackaged hacker tools including Aircrack-ng, Kismet, Nmap, Wireshark, and Metasploit Framework among others.

The OS doesn’t come with non-essential applications like Gimp and LibreOffice which mainstream Linux distros provide – making it arguably the perfect environment for those who want to concentrate on delving into the world of computer security and hacking.

It is therefore with an assurance of quality that we introduce to you the Kali Linux Wireless Penetration Testing: Beginner’s Guide (by authors, Vivek Ramachandran and Cameron Buchanan) – the ideal manual to get you up and running with not just Wireless Penetration Testing, but also Kali Linux.

Kali Linux: Wireless Penetration Testing Beginner's Guide

Kali Linux: Wireless Penetration Testing Beginner’s Guide

What’s Inside the Book?

The Chapters are as follows:

  1. Wireless Lab Setup
  2. WLAN and its Inherent Insecurities
  3. Bypassing WLAN Authentication
  4. WLAN Encryption Flaws
  5. Attacks on the WLAN Infrastructure
  6. Attacking the Client
  7. Advanced WLAN Attacks
  8. Attacking WPA-Enterprise and Radius
  9. WLAN Penetration Testing Methodology
  10. WPS and Probes

By the end of this book, you would have explored the ins and outs of wireless technologies having learned:

  • How to create wireless labs for your hacking experiments;
  • How to discover wireless packets, hidden networks, and hidden SSIDs;
  • How to capture WPA-2 keys (and crack them as well);
  • How to sniff wireless traffic to collect relevant data and to sniff probe requests to track users through their SSID history;
  • How to decrypt encrypted traffic with stolen keys
  Introducing Linux: Ultimate Beginner's Guide

The book is available in the Amazon store, so go ahead and grab yourself a copy if you are interested in its content.

Your Unwavering Support Matters a Lot:

The cost of maintenance is skyrocketing as more readers are coming on board and the ad service that we employ in order to generate revenue is unfortunately no longer sufficient and this is especially due to the increased use of ad-blockers.

We humbly request that you consider disabling your ad-blockers to support us financially or by donating as anything from $1. Your donation(s) will go a long way in supporting FossMint and sister site, TecMint, in running efficiently. Thank you.

Make a Contribution via PayPal

Top Deals

About the author

Martins D. Okoi

Martins Divine Okoi is a graduate of Computer Science with a passion for Linux and the Open Source community. He works as a Graphic Designer, Web Developer, and programmer.