Step By Step Kali Linux and Wireless Hacking Basics, 2015 Edition
Written for someone inexperienced with wireless penetration testing, "Wireless Hacking Basics" gives a step by step overview and look of installing Kali Linux and hacking wireless devices connected to a WEP or WPA / WPA2 encrypted router. Learn how to setup a testing environment, Man-in-the-Middle attacks, Reaver, WPA / WPA2 dictionary attacks, Hydra and much more.
Also includes:
Installing Kali Linux
Booting from a DVD
Installing and Running with VMware
WEP Hacking
Reaver
WPA Dictionary Attack
Getting a Handshake and a Data Capture
Using Aircrack and a Dictionary to Crack a WPA Data Capture
Cracking a WPA Capture with the GPU using HashCat
Creating a Dictionary / Wordlist with Crunch
Rainbow Tables
Hacking into a android smartphone and taking control
Smartphones and Wireless Pen Testing
Using Hydra to gain access to admin login of a router
Man in the middle attacks (MitM) Ettercap and sslstrip
Bypassing Mac address filtering
Using the built-in Kali wordlist rockyou.txt
Adjusting wireless USB adapters transmit power