June 2017
Intermediate to advanced
510 pages
11h 35m
English
With the dominance of mobile devices, the adoption of Bring Your Own Device (BYOD) initiatives in companies, and the need to provide instant network connectivity, wireless networks have become the ubiquitous access point to the internet. Unfortunately, the convenience of wireless access is accompanied with an increase in effective attacks that result in theft of data and unauthorized access, as well as the denial of network resource services. Kali provides several tools for configuring and launching these wireless attacks.
In this chapter, we will examine several housekeeping tasks and wireless attacks, which will entail covering the following:
Read now
Unlock full access