Skip to Main Content
Penetration Tester's Open Source Toolkit, 3rd Edition
book

Penetration Tester's Open Source Toolkit, 3rd Edition

by Jeremy Faircloth
August 2011
Intermediate to advanced content levelIntermediate to advanced
464 pages
12h 57m
English
Syngress
Content preview from Penetration Tester's Open Source Toolkit, 3rd Edition
Chapter 9. Wireless penetration testing
Information in this chapter
• Objective
• Approach
• Core Technologies
• Open Source Tools
• Case Study: The Tools in Action
• Hands-On Challenge
Usually, the system being compromised during a penetration test is part of a physical network. But sometimes systems are connected to wireless networks. This means the penetration tester must test the client's wireless network for vulnerabilities or use the wireless network to further compromise the client's system. In both cases, the wireless network is another layer that must be analyzed or compromised before additional penetration testing can be performed on the client's hosts. This chapter focuses on wireless penetration testing, providing readers with details on ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Tester's Open Source Toolkit, 2nd Edition

Penetration Tester's Open Source Toolkit, 2nd Edition

Chris Hurley, Jeremy Faircloth

Publisher Resources

ISBN: 9781597496278