BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell
| BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell |
| Autore | Cardwell Kevin |
| Pubbl/distr/stampa | Birmingham, : Packt Pub., 2013 |
| Descrizione fisica | 1 online resource (108 p.) |
| Collana | Open source : community experience distilled |
| Soggetto topico |
Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing Open source software |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-78216-407-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network. |
| Record Nr. | UNINA-9910463038803321 |
Cardwell Kevin
|
||
| Birmingham, : Packt Pub., 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell
| BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell |
| Autore | Cardwell Kevin |
| Pubbl/distr/stampa | Birmingham, : Packt Pub., 2013 |
| Descrizione fisica | 1 online resource (108 p.) |
| Collana | Open source : community experience distilled |
| Soggetto topico |
Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing Open source software |
| ISBN | 1-78216-407-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network. |
| Record Nr. | UNINA-9910786936503321 |
Cardwell Kevin
|
||
| Birmingham, : Packt Pub., 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
BackTrack : testing wireless network security / / Kevin Cardwell
| BackTrack : testing wireless network security / / Kevin Cardwell |
| Autore | Cardwell Kevin |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Birmingham, : Packt Pub., 2013 |
| Descrizione fisica | 1 online resource (108 p.) |
| Disciplina | 005.8 |
| Collana | Open source : community experience distilled |
| Soggetto topico |
Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing Open source software |
| ISBN |
9781782164074
1782164073 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network. |
| Record Nr. | UNINA-9910969049603321 |
Cardwell Kevin
|
||
| Birmingham, : Packt Pub., 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
| BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran |
| Autore | Ramachandran Vivek |
| Pubbl/distr/stampa | Birmingham [U.K.], : Packt Pub. Ltd., 2011 |
| Descrizione fisica | 1 online resource (220 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computers - Access control
Penetration testing (Computer security) Computer networks - Security measures - Testing |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-62198-900-3
1-283-30827-4 9786613308276 1-84951-559-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Wireless Lab Setup; Hardware requirements; Software requirements; Installing BackTrack; Time for action - installing BackTrack; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2:WLAN and ItsInherent Insecurities; Revisiting WLAN frames
Time for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing Management, Control, And Data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your Alfa card; Role of regulatory domains in wireless; Time for action - experimenting with your Alfa card; Summary; Chapter 3:Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters Time for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4:WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrase; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks Time for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5:Attacks on the WLANInfrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access; points; Denial of service attacks; Time for action - De-Authentication DoS attack; Evil twin and access point MAC spoofing; Time for action - evil twin with MAC spoofing; Rogue access point; Time for action - Rogue access point; Summary; Chapter 6:Attacking the Client; Honeypot and Mis-Association attacks Time for action - orchestrating a Mis-Association attackCaffe Latte attack; Time for action - conducting the Caffe Latte attack; De-Authentication and Dis-Association Attacks; Time for action - De-Authenticating the client; Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7:Advanced WLAN Attacks; Man-in-the-Middle attack; Time for action - Man-in-the-Middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session Hijacking over wireless Time for action - Session hijacking over wireless |
| Record Nr. | UNINA-9910457323203321 |
Ramachandran Vivek
|
||
| Birmingham [U.K.], : Packt Pub. Ltd., 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
| BackTrack 5 wireless penetration testing [[electronic resource] ] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran |
| Autore | Ramachandran Vivek |
| Pubbl/distr/stampa | Birmingham [U.K.], : Packt Pub. Ltd., 2011 |
| Descrizione fisica | 1 online resource (220 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computers - Access control
Penetration testing (Computer security) Computer networks - Security measures - Testing |
| ISBN |
1-62198-900-3
1-283-30827-4 9786613308276 1-84951-559-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Wireless Lab Setup; Hardware requirements; Software requirements; Installing BackTrack; Time for action - installing BackTrack; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2:WLAN and ItsInherent Insecurities; Revisiting WLAN frames
Time for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing Management, Control, And Data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your Alfa card; Role of regulatory domains in wireless; Time for action - experimenting with your Alfa card; Summary; Chapter 3:Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters Time for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4:WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrase; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks Time for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5:Attacks on the WLANInfrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access; points; Denial of service attacks; Time for action - De-Authentication DoS attack; Evil twin and access point MAC spoofing; Time for action - evil twin with MAC spoofing; Rogue access point; Time for action - Rogue access point; Summary; Chapter 6:Attacking the Client; Honeypot and Mis-Association attacks Time for action - orchestrating a Mis-Association attackCaffe Latte attack; Time for action - conducting the Caffe Latte attack; De-Authentication and Dis-Association Attacks; Time for action - De-Authenticating the client; Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7:Advanced WLAN Attacks; Man-in-the-Middle attack; Time for action - Man-in-the-Middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session Hijacking over wireless Time for action - Session hijacking over wireless |
| Record Nr. | UNINA-9910781707903321 |
Ramachandran Vivek
|
||
| Birmingham [U.K.], : Packt Pub. Ltd., 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran
| BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / / Vivek Ramachandran |
| Autore | Ramachandran Vivek |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Birmingham [U.K.], : Packt Pub. Ltd., 2011 |
| Descrizione fisica | 1 online resource (220 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computers - Access control
Penetration testing (Computer security) Computer networks - Security measures - Testing |
| ISBN |
9786613308276
9781621989004 1621989003 9781283308274 1283308274 9781849515597 184951559X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Wireless Lab Setup; Hardware requirements; Software requirements; Installing BackTrack; Time for action - installing BackTrack; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2:WLAN and ItsInherent Insecurities; Revisiting WLAN frames
Time for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing Management, Control, And Data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your Alfa card; Role of regulatory domains in wireless; Time for action - experimenting with your Alfa card; Summary; Chapter 3:Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters Time for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4:WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrase; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks Time for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5:Attacks on the WLANInfrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access; points; Denial of service attacks; Time for action - De-Authentication DoS attack; Evil twin and access point MAC spoofing; Time for action - evil twin with MAC spoofing; Rogue access point; Time for action - Rogue access point; Summary; Chapter 6:Attacking the Client; Honeypot and Mis-Association attacks Time for action - orchestrating a Mis-Association attackCaffe Latte attack; Time for action - conducting the Caffe Latte attack; De-Authentication and Dis-Association Attacks; Time for action - De-Authenticating the client; Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7:Advanced WLAN Attacks; Man-in-the-Middle attack; Time for action - Man-in-the-Middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session Hijacking over wireless Time for action - Session hijacking over wireless |
| Record Nr. | UNINA-9910957551003321 |
Ramachandran Vivek
|
||
| Birmingham [U.K.], : Packt Pub. Ltd., 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Build your own security lab [[electronic resource] ] : a field guide for network testing / / Michael Gregg
| Build your own security lab [[electronic resource] ] : a field guide for network testing / / Michael Gregg |
| Autore | Gregg Michael (Michael C.) |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2008 |
| Descrizione fisica | 1 online resource (458 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer networks - Security measures - Testing
Wireless communication systems - Security measures - Testing |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-31800-0
9786611318000 0-470-37947-2 0-470-37948-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Build Your Own Security Lab: A Field Guide for Network Testing; About the Author; Credits; Contents at a Glance; Contents; Acknowledgments; Introduction; Chapter 1: Hardware and Gear; Chapter 2: Building a Software Test Platform; Chapter 3: Passive Information Gathering; Chapter 4: Detecting Live Systems; Chapter 5: Enumerating Systems; Chapter 6: Automated Attack and Penetration Tools; Chapter 7: Understanding Cryptographic Systems; Chapter 8: Defeating Malware; Chapter 9: Securing Wireless Systems; Chapter 10: Intrusion Detection; Chapter 11: Forensic Detection; Appendix A: About the DVD
Index |
| Record Nr. | UNINA-9910454507803321 |
Gregg Michael (Michael C.)
|
||
| Indianapolis, IN, : Wiley, c2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Build your own security lab [[electronic resource] ] : a field guide for network testing / / Michael Gregg
| Build your own security lab [[electronic resource] ] : a field guide for network testing / / Michael Gregg |
| Autore | Gregg Michael (Michael C.) |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2008 |
| Descrizione fisica | 1 online resource (458 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer networks - Security measures - Testing
Wireless communication systems - Security measures - Testing |
| ISBN |
1-281-31800-0
9786611318000 0-470-37947-2 0-470-37948-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Build Your Own Security Lab: A Field Guide for Network Testing; About the Author; Credits; Contents at a Glance; Contents; Acknowledgments; Introduction; Chapter 1: Hardware and Gear; Chapter 2: Building a Software Test Platform; Chapter 3: Passive Information Gathering; Chapter 4: Detecting Live Systems; Chapter 5: Enumerating Systems; Chapter 6: Automated Attack and Penetration Tools; Chapter 7: Understanding Cryptographic Systems; Chapter 8: Defeating Malware; Chapter 9: Securing Wireless Systems; Chapter 10: Intrusion Detection; Chapter 11: Forensic Detection; Appendix A: About the DVD
Index |
| Record Nr. | UNINA-9910782797003321 |
Gregg Michael (Michael C.)
|
||
| Indianapolis, IN, : Wiley, c2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits / / James S. Tiller
| CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits / / James S. Tiller |
| Autore | Tiller James S. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
| Descrizione fisica | 1 online resource (556 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures - Testing Business enterprises - Data processing |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-429-18475-1
1-283-59631-8 9786613908766 1-4398-8028-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cover; Title Page; Copyright; Contents; Foreword; Chapter 1: Getting Started; Chapter 2: Setting the Stage; Chapter 3: The Framework; Chapter 4: The Business Perspective; Chapter 5: Planning for a Controlled Attack; Chapter 6: Preparing for a Hack; Chapter 7: Reconnaissance; Chapter 8: Enumeration; Chapter 9: Vulnerability Analysis; Chapter 10: Exploitation; Chapter 11: The Deliverable; Chapter 12: Integrating the Results; Index |
| Record Nr. | UNINA-9910457904203321 |
Tiller James S.
|
||
| Boca Raton, Fla. : , : CRC Press, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits / / James S. Tiller
| CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits / / James S. Tiller |
| Autore | Tiller James S. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
| Descrizione fisica | 1 online resource (556 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures - Testing Business enterprises - Data processing |
| ISBN |
1-4665-1685-2
0-429-18475-1 1-283-59631-8 9786613908766 1-4398-8028-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cover; Title Page; Copyright; Contents; Foreword; Chapter 1: Getting Started; Chapter 2: Setting the Stage; Chapter 3: The Framework; Chapter 4: The Business Perspective; Chapter 5: Planning for a Controlled Attack; Chapter 6: Preparing for a Hack; Chapter 7: Reconnaissance; Chapter 8: Enumeration; Chapter 9: Vulnerability Analysis; Chapter 10: Exploitation; Chapter 11: The Deliverable; Chapter 12: Integrating the Results; Index |
| Altri titoli varianti | Guide to penetration testing |
| Record Nr. | UNINA-9910781524403321 |
Tiller James S.
|
||
| Boca Raton, Fla. : , : CRC Press, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||