NEVER MISS AN ISSUE!

Sign up to receive our monthly newsletter.

  • This field is for validation purposes and should be left unchanged.
  • This field is hidden when viewing the form

ABOUT THIS BOOK

PUBLISHER: Packt Publishing Limited

FORMAT: Electronic book text

ISBN: 9781788628853

RRP: £35.98

PAGES: 345

PUBLICATION DATE:
May 31, 2018

BUY THIS BOOK

As an Amazon Associate and Bookshop.org affiliate we earn from qualifying purchases.

Metasploit Wireless Penetration Testing

Arulselvar Thomas

Defend against the latest wireless network attacks with this fast-paced, practical learning guide, all using the Metasploit framework.About This Book* Identify and expose vulnerable wireless technologies with Metasploit.* Successfully bypass wireless networks and devices to fetch sensitive data from Wi-Fi network, Bluetooth and wireless IoT devices* A step-by-step guide that will help you implement defensive techniques to your wireless systems successfullyWho This Book Is ForIf you are an ethical hacker, a penetration tester or network /system administrator interested in exploring their wireless penetration testing options with Metasploit then, this book is for you. Information security professionals and wireless system developers will also find this book useful. Some knowledge on Linux/Unix systems and basic understanding of penetration testing would work wonders.What You Will Learn* Importance of Wireless technologies and security risk* Effective way to use Metasploit against wireless technologies* Public available exploits for wifi Hotspots* Conducting security assessment of Bluetooth, Zigbee, DECT and NFC* Conducting security assessment for IOT and Surveillance camera networksIn DetailWith the increased use of wireless networks and wireless devices, exploitation threats over these mediums have massively increased. Our book will widely focus on using Metasploit to pentest wireless technologies like WPA2, WiFi, Bluetooth, Bluetooth Low Energy, DECT and so on. This book will provide you with extensive set of solutions on threats, exploits, and defensive techniques along with hands-on experience in evaluating and attacking wireless technologies. Along the way, this book will deep dive into teaching you to exploit a variety of wireless security challenges like Wireless data collection, WEP attacks, WPA2 attacks, wireless client attacks, enterprise WPA2 attacks, WiFi DoS attacks, DECT, and advanced Bluetooth threats and so on. Later, this book will also focus on developing custom attacks with the latest Windows and Mac OS versions. Finally, this book will also teach you to exploit IoT-devices connected over wireless networks (Wi-Fi cameras).By the end of this book, you will gain immense knowledge of leveraging Metasploit to identifying threats and expose them implementing defensive techniques that will protect your wireless systems.

Share this