Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Wifi Hacking : Beginner to Pro (FULL COURSE): A Guide to Pentesting Wifi

Posted By: naag
Wifi Hacking : Beginner to Pro (FULL COURSE): A Guide to Pentesting Wifi

Wifi Hacking : Beginner to Pro (FULL COURSE): A Guide to Pentesting Wifi
English | 2017 | ASIN: B0732P2BVV | 756 pages | PDF, EPUB, AZW3(conv) | 5.54 Mb

Wi-Fi or WiFi is a technology for wireless local area networking with devices based on the IEEE 802.11 standards. Wi-Fi is a trademark of the Wi-Fi Alliance, which restricts the use of the term Wi-Fi Certified to products that successfully complete interoperability certification testing.

Devices that can use Wi-Fi technology include personal computers, video-game consoles, smartphones, digital cameras, tablet computers, digital audio players and modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN and a wireless access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square kilometres achieved by using multiple overlapping access points.


Depiction of a device sending information wirelessly to another device, both connected to the local network, in order to print a document
Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Having no physical connections, it is more vulnerable to attack than wired connections, such as Ethernet.

Well this is not much,

Cracking of wireless networks is the defeating of security devices in Wireless local-area networks. Wireless local-area networks(WLANs) – also called Wi-Fi networks are inherently vulnerable to security lapses that wired networks are exempt from.[1]

Cracking is a kind of information network attack that is akin to a direct intrusion. There are two basic types of vulnerabilities associated with WLANs: those caused by poor configuration and those caused by weak encryption.


In this book you can find vairous tools of wifi hacking and pentesting techniques .
Also includes:
Installing Kali Linux
Booting from a DVD
Installing and Running with VMware
WEP Hacking
WPA Hacking
WPA 2 Hacking
Using Aircrack and a Dictionary to Crack a WPA Data Capture

The purpose of this book is to give you the knowledge on wireless hacking that you are seeking and for you to use it in an educational manner, not a malicious one.