Text
Kali Linux: 300% attack
Daftar isi:
Chapter I Backtrack, kali linux, and ethical hacking
Chapter II Using virtual machine
Chapter III Connecting to a network
Chapter IV Wireless TX power
Chapter V Uncovering hidden SSID of wireless access point
Chapter VI Bypassing MAC filters on AP
Chapter VII Breaking WPA2 wireless
Chapter VIII Rogue wireless access point and evil twins
Chapter IX Wireless mis-association attacks
Chapter X X window system
Chapter XI NMAP: the powerfull scanner
Chapter XII Dinamic host configuration protocols attacks
Chapter XIII Spanning tree protocols attacks
Chapter XIV Cisco discovery protocol flooding (DOS) attack
Chapter XV Hot standby rounter protocol attacks
Chapter XVI Dynamic trunking protocol attack
Chapter XVII Address resolution protocol spoofing attack
Chapter XVIII Downgrade HTTPS to HTTP
No other version available