My Library

University LibraryCatalogue

     
Limit search to items available for borrowing or consultation
Result Page: Previous Next
Can't find that book? Try BONUS+
 

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

E-RESOURCE
Author Farhat, Farrukh, author.

Title BackTrack 5 Wireless Penetration Testing [electronic resource] / Farhat, Farrukh.

Published Packt Publishing, 2013.

Copies

Location Call No. Status
 UniM INTERNET video    AVAILABLE
Edition 1st edition
Physical description 3 hours, 16 minutes, 15 seconds
Series Safari Books Online
Summary Watch and learn about wireless penetration testing using the latest version of the BackTrack penetrating testing suite About This Video An ideal video course that provides the right blend between the theoretical fundamentals and the practical essentials of wireless penetration testing Covers the various facets of wireless penetration testing including attacks on the WEP, WPA, WPA2, WPS, EAP protocols, DoS attacks, MITM attacks, enterprise wireless attacks, and many more! Covers some of the latest developments in wireless security penetration testing like WPS PIN brute forcing, cloud-based MS-CHAP decryption using ChapCrack, and many more In Detail Wi-Fi is a popular technology that helps satisfy our need for continuous connectivity with some inherent security risks and vulnerabilities. In a society with an increasing level of discoveable Wi-Fi networks, wireless penetration testing allows you to verify whether your own networks are as secure as you'd like them to be. Armed with the essentials, you will learn how to conduct a host of cutting edge wireless attacks. You will learn how to execute attacks such as WLAN packet sniffing, revealing hidden SSIDs, open authentication by defeating MAC address filters, bypassing shared authentication, cracking WEP and WPA/WPA2 encryption. In addition to documenting the essentials of wireless penetration testing, we will also discuss setting up rogue APs and wireless evil twins, client-based WEP cracking attacks, wireless infrastructure-based attacks, WPS PIN brute force attacks, denial of service (DoS) attacks, eavesdropping and session hijacking, EAP-based enterprise wireless hacking; and much more. Coverage also includes various countermeasures to protect wireless networks against these types of attacks, in order to help bolster the wireless security of any given network.
Reproduction Electronic reproduction. Boston, MA : Safari, Available via World Wide Web. 2013.
System notes Mode of access: World Wide Web.
NOTES Packt Publishing 2013
Issuing body notes Made available through: Safari, an O’Reilly Media Company.
Other author Safari, an O’Reilly Media Company.
Subject Electronic videos.
ISBN 9781782161202
Standard Number 9781782161202