Kali Linux Wireless Penetration Testing Essentials
5/5
()
About this ebook
Related to Kali Linux Wireless Penetration Testing Essentials
Related ebooks
Wireshark Network Security Rating: 3 out of 5 stars3/5Mastering Kali Linux for Advanced Penetration Testing - Second Edition Rating: 0 out of 5 stars0 ratingsKali Linux Network Scanning Cookbook - Second Edition Rating: 0 out of 5 stars0 ratingsMastering Kali Linux for Advanced Penetration Testing Rating: 4 out of 5 stars4/5Python Penetration Testing Essentials Rating: 5 out of 5 stars5/5Mastering Kali Linux for Web Penetration Testing Rating: 4 out of 5 stars4/5Nmap Essentials Rating: 4 out of 5 stars4/5Penetration Testing with Raspberry Pi - Second Edition Rating: 5 out of 5 stars5/5Penetration Testing with the Bash shell Rating: 0 out of 5 stars0 ratingsBurp Suite Essentials Rating: 4 out of 5 stars4/5Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools Rating: 0 out of 5 stars0 ratingsMastering Wireshark Rating: 2 out of 5 stars2/5Building Virtual Pentesting Labs for Advanced Penetration Testing Rating: 0 out of 5 stars0 ratingsPenetration Testing with Raspberry Pi Rating: 5 out of 5 stars5/5Penetration Testing with BackBox Rating: 0 out of 5 stars0 ratingsMastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Rating: 0 out of 5 stars0 ratingsMastering Python Forensics Rating: 4 out of 5 stars4/5Cuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsMastering Python Networking Rating: 5 out of 5 stars5/5Web Penetration Testing: Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsLearning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Kali Linux Intrusion and Exploitation Cookbook Rating: 5 out of 5 stars5/5Kali Linux Wireless Penetration Testing: Beginner's Guide Rating: 0 out of 5 stars0 ratings
Networking For You
CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsThe Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam Rating: 5 out of 5 stars5/5A Beginner's Guide to Ham Radio Rating: 0 out of 5 stars0 ratingsNetworking All-in-One For Dummies Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Microsoft Certified Azure Fundamentals Study Guide: Exam AZ-900 Rating: 0 out of 5 stars0 ratingsNetworking For Dummies Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsProgramming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5Concise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5Emergency Preparedness and Off-Grid Communication Rating: 3 out of 5 stars3/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5CCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsHome Networking Do-It-Yourself For Dummies Rating: 4 out of 5 stars4/5Microsoft Azure For Dummies Rating: 0 out of 5 stars0 ratingsNmap Essentials Rating: 4 out of 5 stars4/5Raspberry Pi Electronics Projects for the Evil Genius Rating: 3 out of 5 stars3/5The Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5Quantum Computing For Dummies Rating: 0 out of 5 stars0 ratingsOSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence Rating: 0 out of 5 stars0 ratingsCisco Networking All-in-One For Dummies Rating: 4 out of 5 stars4/5Group Policy: Fundamentals, Security, and the Managed Desktop Rating: 0 out of 5 stars0 ratingsComputer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5Nmap: Network Exploration and Security Auditing Cookbook - Second Edition Rating: 0 out of 5 stars0 ratingsTCP / IP For Dummies Rating: 5 out of 5 stars5/5Windows Command Line Administration Instant Reference Rating: 0 out of 5 stars0 ratingsNetworking Fundamentals: Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366 Rating: 0 out of 5 stars0 ratingsA Practical Guide Wireshark Forensics Rating: 5 out of 5 stars5/5
Reviews for Kali Linux Wireless Penetration Testing Essentials
2 ratings0 reviews
Book preview
Kali Linux Wireless Penetration Testing Essentials - Marco Alamanni
Table of Contents
Kali Linux Wireless Penetration Testing Essentials
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
1. Introduction to Wireless Penetration Testing
Phases of penetration testing
The planning phase
The discovery phase
The attack phase
The reporting phase
The executive summary
The technical report
Summary
2. Setting Up Your Machine with Kali Linux
Introduction to the Kali Linux distribution
Installing Kali Linux
Installation on a virtual machine
Creating a new virtual machine
Installation steps
Wireless adapter setup and configuration
Requirements of the wireless adapter
Wireless card configuration
Testing the adapter for wireless penetration testing
Troubleshooting
Summary
3. WLAN Reconnaissance
Introduction to 802.11 standard and wireless LAN
802.11 frames, types, and subtypes
Infrastructure mode and wireless access points
Wireless security
Wireless LAN scanning
Configuring the wireless adapter in monitor mode
Wireless scanning with airodump-ng
Wireless scanning with Kismet
Summary
4. WEP Cracking
An introduction to WEP
Attacks against WEP
WEP cracking with Aircrack-ng
Cracking the WEP key with connected clients
Cracking the WEP key without connected clients
The Fragmentation and ChopChop attacks
Forging and injecting ARP request frames
WEP cracking with automated tools
WEP cracking with Fern WiFi Cracker
Summary
5. WPA/WPA2 Cracking
An introduction to WPA/WPA2
Attacking the WPA
WPA cracking with Aircrack-ng
WPA cracking with Cowpatty
WPA cracking with the GPU
Pyrit
oclHashcat
WPA cracking with automated tools
Wifite
Summary
6. Attacking Access Points and the Infrastructure
Attacks against Wi-Fi Protected Setup
Reaver
Attacking WPA-Enterprise
Setting up a WPA-Enterprise network
Attacks targeting EAP
Attacking PEAP
Denial of Service attacks
DoS attacks with MDK3
Rogue access points
Attacking AP authentication credentials
Summary
7. Wireless Client Attacks
Honeypot access points and Evil Twin attacks
The Evil Twin attack in practice
Man-in-the-middle attacks
Ghost phisher
The Caffe Latte attack
The Hirte attack
Cracking WPA keys without the AP
Summary
8. Reporting and Conclusions
The four stages of report writing
Report planning
Information collection
Documentation tools
Writing the first draft
Review and finalization
The report format
The executive summary
The technical report
Summary
Conclusions
A. References
Chapter 1 – Introduction to Wireless Penetration Testing
Chapter 2 – Setting Up Your Machine with Kali Linux
Chapter 3 – WLAN Reconnaissance
Chapter 4 – WEP Cracking
Chapter 5 – WPA/WPA2 Cracking
Chapter 6 – Attacking Access Points and the Infrastructure
Chapter 7 – Wireless Client Attacks
Chapter 8 – Reporting and Conclusions
Index
Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing Essentials
Copyright © 2015 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: July 2015
Production reference: 1240715
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78528-085-6
www.packtpub.com
Credits
Author
Marco Alamanni
Reviewers
Abhishek Dashora
Panos Georgiadis
Vijay Kumar
Sina Manavi
Commissioning Editor
Julian Ursell
Acquisition Editors
Prachi Bisht
Usha Iyer
Content Development Editor
Riddhi Tuljapurkar
Technical Editor
Vivek Arora
Copy Editor
Laxmi Subramanian
Project Coordinator
Sanchita Mandal
Proofreader
Safis Editing
Indexer
Rekha Nair
Graphics
Jason Monteiro
Production Coordinator
Aparna Bhagat
Cover Work
Aparna Bhagat
Disclaimer
This book contains instructions on how to perpetrate attacks with Kali Linux. These tasks are likely to be illegal in your jurisdiction in many circumstances, or at least count as terms of service violation or professional misconduct. The instructions are provided so that you can test your system against threats, understand the nature of these threats, and protect your own systems from similar attacks.
About the Author
Marco Alamanni has professional experience working as a Linux system administrator and information security administrator/analyst in banks and financial institutions.
He holds a BSc in computer science and an MSc in information security. His interests in information technology include, among other things, ethical hacking, digital forensics, malware analysis, Linux, and programming. He also collaborates with IT magazines to write articles about Linux and IT security.
I would like to thank Packt Publishing for giving me the precious opportunity to write my first complete book and the people who have worked with me on this project, especially Riddhi Tuljapurkar and Usha Iyer, for their valuable cooperation and support.
Special thanks go to my beloved family, my wife, and my two sons, to whom this book is dedicated.
About the Reviewers
Abhishek Dashora is a security researcher, penetration tester, and certified ethical hacker from India, who is currently associated with KPMG, India. He is actively involved in responsible disclosure programs and bug bounties and has received a number of hall of fames from several organizations. He is EC Council's certified ethical hacker and a CISCO certified network associate.
His hobbies include, but are not limited to, playing table tennis and cricket. He spends most of his time on the Internet.
I would like to thank Jimmy for her motivation and continuous support and my mother, Aruna Dashora, for letting me do what I wanted to.
Panos Georgiadis is working for SUSE Linux as a QA engineer for maintenance. He has studied automation engineering at Alexander Technological Educational Institute of Thessaloniki, and he's also a Cisco associate. In the past, he has had several projects running, working on hardware reviews, technical articles, and pretty much everything that has caught his attention. He has more than 10 years of experience working with Linux while crafting skills such as C/C++, Python, and Bash. Last but not least, he's also the reviewer of Cuda 5 Cookbook.
I would like to dedicate this book to my father.
Vijay Kumar works as a security consultant. He has completed his master's in science in advance computing from University of Bristol, UK, and his bachelor's in information technology from Birla Institute of Technology, Mesra, Ranchi. He has over 3 years of industry experience and 11 months of research experience. His areas of interest and experience include network security, penetration testing, network/Linux/Unix administration, designing a secure infrastructure, binary exploitation, reverse engineering, cryptography, wireless security, and forensics.
Sina Manavi is a security enthusiast interested in penetration testing and digital forensics investigation. He has a master's degree in computer science in the field of digital forensics investigation, and is also a certificate holder of CEH and CHFI. He has conducted many security talks and practical workshops and training on web/network/mobile penetration testing in Malaysia. His main interest is in mobile app penetration testing. He started his IT career as a software and database developer, and later on, joined the software and database designing field. Currently, he works as a professional trainer and information security consultant for Kaapagam Technologies Sdn. Bhd. in Malaysia.
www.PacktPub.com
Support files, eBooks, discount offers, and more
For support files and downloads related to your book, please visit www.PacktPub.com.
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at
At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.
https://www2.packtpub.com/books/subscription/packtlib
Do