Hacking Wireless Networks - The Ultimate Hands-on Guide
by Mr Andreas Kolokithas /
2015 / English / Kindle
41.5 MB Download
Are you tired of buying security books and at the end discover that
they contain only theory and no practical examples at all? Do you
want to setup your own hacking lab and learn through practice? If
yes, then this is the book for you! Hacking Wireless Networks - The
ultimate hands-on guide, is a book written for people who seek to
practice the techniques of assessing the security of wireless
infrastructures.Through 30 real life scenarios and more than 300
figures the book examines in details the following areas: -
Discovery and Profiling of wireless networks - Denial of Service
attacks - Attacks against WEP secured wireless networks - Attacks
against WPA/WPA2 secured wireless networks - Bypass techniques for
popular Authentication mechanisms - Encryption keys cracking using
special techniques - Attacks against the Access Point's management
interface - Attacks against special security features like WPS -
Stealthy techniques to avoid getting caught by wireless IDS Now
that the world agrees that wireless security is central to computer
security, it is time to put theory into practice.
Are you tired of buying security books and at the end discover that
they contain only theory and no practical examples at all? Do you
want to setup your own hacking lab and learn through practice? If
yes, then this is the book for you! Hacking Wireless Networks - The
ultimate hands-on guide, is a book written for people who seek to
practice the techniques of assessing the security of wireless
infrastructures.Through 30 real life scenarios and more than 300
figures the book examines in details the following areas: -
Discovery and Profiling of wireless networks - Denial of Service
attacks - Attacks against WEP secured wireless networks - Attacks
against WPA/WPA2 secured wireless networks - Bypass techniques for
popular Authentication mechanisms - Encryption keys cracking using
special techniques - Attacks against the Access Point's management
interface - Attacks against special security features like WPS -
Stealthy techniques to avoid getting caught by wireless IDS Now
that the world agrees that wireless security is central to computer
security, it is time to put theory into practice.