Penetration Testing - 3 Manuscripts—Wireless Hacking, Tor and the Dark Net, and Powershell by Logan Styles.pdf
(
1741 KB
)
Pobierz
Wireless Hacking:
The Beginner’s Guide to Hacking Wireless
Networks
Logan Styles
Table of Contents
Introduction
Chapter 1: The Basics
Chapter 2: Kali Linux Setup
Chapter 3: Using Kali Linux to Find Vulnerabilities in a Website
Chapter 4: Penetration Testing
Chapter 5: Computer Hacking Basics
Chapter 6: Hacking Tips and Tricks
Conclusion
Copyright 2017 by Logan Styles - All rights reserved.
The following eBook is reproduced below with the goal of providing information that is as
accurate and reliable as possible. Regardless, purchasing this eBook can be seen as consent to the
fact that both the publisher and the author of this book are in no way experts on the topics
discussed within and that any recommendations or suggestions that are made herein are for
entertainment purposes only. Professionals should be consulted as needed prior to undertaking
any of the action endorsed herein.
This declaration is deemed fair and valid by both the American Bar Association and the
Committee of Publishers Association and is legally binding throughout the United States.
Furthermore, the transmission, duplication or reproduction of any of the following work including
specific information will be considered an illegal act irrespective of if it is done electronically or
in print. This extends to creating a secondary or tertiary copy of the work or a recorded copy and
is only allowed with express written consent from the Publisher. All additional right reserved.
The information in the following pages is broadly considered to be a truthful and accurate account
of facts and as such any inattention, use or misuse of the information in question by the reader will
render any resulting actions solely under their purview. There are no scenarios in which the
publisher or the original author of this work can be in any fashion deemed liable for any hardship
or damages that may befall them after undertaking information described herein.
Additionally, the information in the following pages is intended only for informational purposes
and should thus be thought of as universal. As befitting its nature, it is presented without
assurance regarding its prolonged validity or interim quality. Trademarks that are mentioned are
done without written consent and can in no way be considered an endorsement from the trademark
holder.
Introduction
Congratulations on downloading Wireless Hacking: A Beginner’s Guide to Hacking Wireless
Networks and thank you for doing so.
The following chapters will discuss: how to hack wireless networks, penetration testing, how to
set up Kali Linux, and basic info on computer hacking.
There are plenty of books on this subject on the market, thanks again for choosing this one! I’ve
done my absolute best to make sure everything is coherent and easy to follow; the goal was to
make sure that even a middle schooler could pick up this book and understand and implement
everything in it. Needless to say, every effort was made to ensure it is full of as much useful
information as possible, please enjoy!
Chapter 1: How to Hack a Wireless Network
There are a few reasons you might want to hack into a wireless network. Perhaps you have
forgotten the password to your own network, or maybe you are trying to test the strength of your
personal network just to make sure no one else can hack into it. Whatever the reason may be,
there are a few ways to hack into a wireless network. So long as you are not going to use these
new found skills for nefarious reasons, of course.
The first method we are going to discuss is called sneakernet. The reason for this name can be
explained with a simple analogy. Usually, the easiest way to sneak into a building is to simply
walk through the front door. The same applies to hacking into a network. You simply walk right
into it. The easiest way to connect to a network, so long as no one is around to see you, is to plug
the laptop into the Ethernet port on the router. You will have immediate access to the internet and
will not need the password. Not only that, you will have instant access to the details of the router.
Most people do not take the time to change administrative user names and passwords for their
routers. Once you are there, you can see and even change the password, manage internet
connections and add your own device to the MAC address on the whitelist. That means you will
always be able to access that network without any issues.
Most newer routers are equipped with Wi-Fi Protected Setup, also known as WPS. If that
happens to be enabled, it will let you join the wireless network by simply attempting to join from
your laptop or mobile device. Once you press the access button on the router, you will hold it
down until your system connects. Moving forward, you will not have to enter a password to
access that network because the router will recognize your device or computer automatically.
Now, what we just talked about is pretty easy, if you can be sneaky enough to access a router
and an Ethernet cord. That can be difficult without being seen, so now we are going to talk about
some more covert ways to get into a network. If you need nothing more than internet access and
could care less which network you get the access from, you can use another method referred to as
wardriving. This is where you drive around (or walk or ride a bike) until you find an unsecured
network. In most cases these days, people are pretty good about locking up their Wi-Fi, though.
That being said, we have a hack for that.
Just like most people lock their Wi-Fi down, those same people tend to use a WEP as their
network security method. Those are ridiculously easy to crack. With every upside there is a
downside, however. The tools you need to crack these codes come from less than reputable
sources and can slow your system as they need to be downloaded in order to work.
One of these solutions is a Linux distribution called PHLAK. This was originally designed to
test the durability of a wireless network. This can be run quite easily from a USB drive or a CD.
With any sort of hacking, you will want to remember to steer clear of your hard drive when using
these types of tools. CD’s and USB drives are devices that cannot be traced. In using those
Plik z chomika:
kufel_007
Inne pliki z tego folderu:
The IoT Hacker’s A Practical Guide to Hacking the Internet of Things.pdf
(18975 KB)
security-cissp-all-in-one-exam-guide-6th-edition.pdf
(60183 KB)
ethical-hacking-a-hands-on-introduction-to-breaking-in.pdf
(8872 KB)
Mastering Reverse Engineering Re-engineer your ethical hacking skills by Reginald Wong.pdf
(14578 KB)
Black-Hat-Go_Go-Programming-For-Hackers-and-Pentesters.pdf
(23456 KB)
Inne foldery tego chomika:
assembly
C#
C++
Hakin9 hacking
ISO
Zgłoś jeśli
naruszono regulamin