Building a Pentesting Lab for Wireless Networks

Vyacheslav Fadyushin, Andrey Popov

  • 出版商: Packt Publishing
  • 出版日期: 2016-03-23
  • 售價: $1,970
  • 貴賓價: 9.5$1,872
  • 語言: 英文
  • 頁數: 264
  • 裝訂: Paperback
  • ISBN: 1785283154
  • ISBN-13: 9781785283154
  • 相關分類: Wireless-networks
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Key Features

  • Design and build an extendable penetration testing lab with wireless access suitable for home and enterprise use
  • Fill the lab with various components and customize them according to your own needs and skill level
  • Secure your lab from unauthorized access and external attacks

Book Description

Starting with the basics of wireless networking and its associated risks, we will guide you through the stages of creating a penetration testing lab with wireless access and preparing your wireless penetration testing machine.

This book will guide you through configuring hardware and virtual network devices, filling the lab network with applications and security solutions, and making it look and work like a real enterprise network. The resulting lab protected with WPA-Enterprise will let you practice most of the attack techniques used in penetration testing projects. Along with a review of penetration testing frameworks, this book is also a detailed manual on preparing a platform for wireless penetration testing. By the end of this book, you will be at the point when you can practice, and research without worrying about your lab environment for every task.

What you will learn

  • Determine your needs and choose the appropriate lab components for them
  • Build a virtual or hardware lab network
  • Imitate an enterprise network and prepare intentionally vulnerable software and services
  • Secure wired and wireless access to your lab
  • Choose a penetration testing framework according to your needs
  • Arm your own wireless hacking platform
  • Get to know the methods to create a strong defense mechanism for your system

About the Author

Vyacheslav Fadyushin (CISA, CEH, PCI ASV) is a security consultant and a penetration tester with more than 9 years of professional experience and a diverse background in various aspects of information security.

His main points of interest and fields of expertise are ethical hacking and penetration testing, infrastructure and application security, mobile security, and information security management.

He is also an author of the book, Penetration Testing: Setting Up a Test Lab How-to, published by Packt Publishing in 2013.

Andrey Popov is a security consultant and penetration tester with rich professional experience and a diverse background in infrastructure and application security, information security management, and ethical hacking. He has been working for a market-leading company along with another security professional since 2007.

Table of Contents

  1. Understanding Wireless Network Security and Risks
  2. Planning Your Lab Environment
  3. Configuring Networking Lab Components
  4. Designing Application Lab Components
  5. Implementing Security
  6. Exploring Hacking Toolkits
  7. Preparing a Wireless Penetration Testing Platform
  8. What's Next?

商品描述(中文翻譯)

主要特點



  • 設計並建立一個可擴展的滲透測試實驗室,具有適合家庭和企業使用的無線訪問功能

  • 根據自己的需求和技能水平,填充實驗室並自定義各種組件

  • 保護實驗室免受未經授權的訪問和外部攻擊

書籍描述


從無線網絡的基礎知識和相關風險開始,我們將引導您通過創建具有無線訪問功能的滲透測試實驗室的各個階段,並準備您的無線滲透測試機器。


本書將指導您配置硬件和虛擬網絡設備,將實驗室網絡填充應用程序和安全解決方案,使其看起來和工作像一個真實的企業網絡。使用WPA-Enterprise保護的實驗室將讓您練習滲透測試項目中使用的大多數攻擊技術。除了對滲透測試框架的評估外,本書還是一本關於準備無線滲透測試平台的詳細手冊。通過閱讀本書,您將能夠在每個任務中無需擔心實驗室環境,自由地進行實踐和研究。

您將學到什麼



  • 確定您的需求並選擇適合的實驗室組件

  • 構建虛擬或硬件實驗室網絡

  • 模擬企業網絡並準備有意漏洞的軟件和服務

  • 保護有線和無線訪問您的實驗室

  • 根據您的需求選擇滲透測試框架

  • 武裝自己的無線黑客平台

  • 了解創建系統強大防禦機制的方法

關於作者


Vyacheslav Fadyushin(CISA,CEH,PCI ASV)是一位安全顧問和滲透測試人員,擁有超過9年的專業經驗,並在信息安全的各個方面具有豐富的背景。


他的主要興趣和專業領域包括道德黑客和滲透測試、基礎設施和應用程序安全、移動安全和信息安全管理。


他還是Packt Publishing於2013年出版的書籍《Penetration Testing: Setting Up a Test Lab How-to》的作者。


Andrey Popov是一位安全顧問和滲透測試人員,擁有豐富的專業經驗,並在基礎設施和應用程序安全、信息安全管理和道德黑客方面具有多樣化的背景。自2007年以來,他一直與另一位安全專業人員一起在一家市場領先的公司工作。

目錄



  1. 了解無線網絡安全和風險

  2. 規劃您的實驗室環境

  3. 配置網絡實驗室組件

  4. 設計應用程序實驗室組件

  5. 實施安全措施

  6. 探索黑客工具包

  7. 準備無線滲透測試平台

  8. 下一步是什麼?