
Today, wireless network has got very extensive application because of its convenient use and structure, and will eventually cover every corner on the earth, I believe. But due to its broadcast form of data transmission in a wireless network environment, that will inevitably lead to security issues. Of course we can ensure data security by setting different encryption methods in a wireless router, but some loopholes of Wi-Fi network or the router itself can often make every trained hacker be able to crack/hack it.
As the successor of BackTrack Linux stopped updating in 2013, Kali Linux has become the most famous OS in the industry today specially used in security penetration test fields. Kali Linux integrates mass penetration testing, network scanning, attack and other special tools. Through its regular system update, users can quickly get the latest all kinds of hacking tools. Hence, Kali Linux has been the only preferred choice for network security professionals now.
According to various security defects and vulnerabilities easy to be used existing in the wireless network, Kali Linux Wireless Penetration Testing: Beginner's Guide shows you how to use Kali Linux to perform various possible penetration tests on Wi-Fi network, including wireless network monitoring, information collection, router penetration, on-line clients penetration these four major parts, covering network scanning, Wireshark package capture & analysis, WPS/WEP/WPA/WPA2/WPA+RADIUS crack, vulnerability scanning, and many other key, practical technologies.

Acquirable Skills
- Create a wireless lab for your experiments
- Sniff out wireless packets and hidden networks
- Capture and crack WPA-2 keys
- Discover hidden SSIDs
- Explore the ins and outs of wireless technologies
- Sniff probe requests and track users through SSID history
- Attack radius authentication systems
- Sniff wireless traffic and collect interesting data
- Decrypt encrypted traffic with stolen keys
Table Of Contents
- Wireless Lab Setup
- WLAN and its Inherent Insecurities
- Bypassing WLAN Authentication
- WLAN Encryption Flaws
- Attacks on the WLAN Infrastructure
- Attacking the Client
- Advanced WLAN Attacks
- Attacking WPA-Enterprise and Radius
- WLAN Penetration Testing Methodology
- WPS and Probes
Download URLs
Format | Download | Size |
![]() |
17.3 MB | |
EPUB | ![]() |
27.9 MB |