O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

What this book covers

Chapter 1, Kali Linux and Wireless Networking, is an introduction to the world of Kali Linux and how it is used to perform wireless penetration testing.

Chapter 2,  Attacking Access Controls, focuses on what access controls are possible in wireless network and how these controls can be subverted.

Chapter 3,  Attacking Integrity Controls, explains the main components that have an effect on integrity and how these controls can be subverted.

Chapter 4,  Attacking Confidentiality, deals with the value of confidentiality in wireless networks and how it can be compromised and altered to intercept data and gather confidential information.

Chapter 5, Attacking Availability, focuses on the importance of availability within wireless ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required