更新时间:2021-07-16 13:13:59
封面
版权信息
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Chapter 1. Wireless Penetration Testing Fundamentals
Wireless communication
Wireless standards
Choosing the right equipment
Kali Linux for the wireless pentester
Summary
Chapter 2. Wireless Network Scanning
Wireless network discovery
802.11 network terminology
The scanning phase
Tools of the trade
Chapter 3. Exploiting Wireless Devices
Attacking the firmware
Attacking the services
Attacking SNMP
Attacking UPnP
Checks on misconfiguration
Chapter 4. Wireless Cracking
Overview of different wireless security protocols
Cracking WPA
Chapter 5. Man-in-the-Middle Attacks
MAC address Spoofing/ARP poisoning
Rogue DHCP server
Name resolution spoofing
DNS spoofing
Configuring Ettercap for DNS spoofing
NBNS spoofing
Chapter 6. Man-in-the-Middle Attacks Using Evil Twin Access Points
Creating virtual access points with Hostapd
Creating virtual access points with airbase-ng
Session hijacking using Tamper Data
Credential harvesting
Web-based malware
SSL stripping attack
Browser AutoPwn
Chapter 7. Advanced Wireless Sniffing
Capturing traffic with Wireshark
Extracting data from unencrypted protocols
Merging packet capture files
Chapter 8. Denial of Service Attacks
An overview of DoS attacks
Management and control frames
Authentication flood attack
The fake beacon flood attack
Metasploit's fake beacon flood attack
The Metasploit deauthentication flood attack
The Metasploit CTS/RTS flood attack
Chapter 9. Wireless Pentesting from Non-Traditional Platforms
Using OpenWrt for wireless assessments
Using Raspberry Pi for wireless assessments
Accessing Kali Linux from a remote location
Using AutoSSH for reverse shell
Powering and concealing your Raspberry Pi or OpenWrt embedded device
Running Kali on Android phones and tablets
Wireless discovery using Android PCAP
Index