Learn Ethical Hacking
Book Reviews

Ebook: Kali Linux Wireless Penetration Testing: Beginner’s Guide

Kali Linux: Wireless Penetration Testing Beginner's Guide
Written by Martins D. Okoi

The Linux environment is the ideal platform for security auditors and penetration testers because of the enormous artillery it provides them with.

Take Kali Linux for example, the Debian-based Linux distro born 10 years ago that is specially designed for digital forensics and penetration testing comes with a ton of prepackaged hacker tools including Aircrack-ng, Kismet, Nmap, Wireshark, and Metasploit Framework among others.

The OS doesn’t come with non-essential applications like Gimp and LibreOffice which mainstream Linux distros provide – making it arguably the perfect environment for those who want to concentrate on delving into the world of computer security and hacking.

It is therefore with an assurance of quality that we introduce to you the Kali Linux Wireless Penetration Testing: Beginner’s Guide (by authors, Vivek Ramachandran and Cameron Buchanan) – the ideal manual to get you up and running with not just Wireless Penetration Testing, but also Kali Linux.

Kali Linux: Wireless Penetration Testing Beginner's Guide

Kali Linux: Wireless Penetration Testing Beginner’s Guide

What’s Inside the Book?

RedHat RHCSA and RHCE Certification Exam Study Ebook

The Chapters are as follows:

  1. Wireless Lab Setup
  2. WLAN and its Inherent Insecurities
  3. Bypassing WLAN Authentication
  4. WLAN Encryption Flaws
  5. Attacks on the WLAN Infrastructure
  6. Attacking the Client
  7. Advanced WLAN Attacks
  8. Attacking WPA-Enterprise and Radius
  9. WLAN Penetration Testing Methodology
  10. WPS and Probes

By the end of this book, you would have explored the ins and outs of wireless technologies having learned:

  • How to create wireless labs for your hacking experiments;
  • How to discover wireless packets, hidden networks, and hidden SSIDs;
  • How to capture WPA-2 keys (and crack them as well);
  • How to sniff wireless traffic to collect relevant data and to sniff probe requests to track users through their SSID history;
  • How to decrypt encrypted traffic with stolen keys
  Introducing Linux: Ultimate Beginner's Guide

The book is available in the Amazon store, so go ahead and grab yourself a copy if you are interested in its content.

Join Our Community Of 250,000+ Linux Lovers by liking us on Facebook, or follow us on Twitter, Google+ and Instagram.

If you liked this article, sign up for the fossmint newsletter for handpicked selection of stories from FossMint delivered to your inbox every day.


Top Deals

About the author

Martins D. Okoi

Martins Jr. (Dillivine) Okoi is a graduate of Computer Science with a passion for Linux and the Open Source community. He works as a Web designer & developer, technical writer, and programmer.