Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Hands-On Penetration Testing with Kali NetHunter
  • Toc
  • feedback
Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter

By : Glen D. Singh, Oriyano
3 (4)
close
Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter

3 (4)
By: Glen D. Singh, Oriyano

Overview of this book

Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You’ll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor.
Table of Contents (17 chapters)
close
Free Chapter
1
Section 1: Exploring Kali NetHunter
4
Section 2: Common Pentesting Tasks and Tools
9
Section 3: Advanced Pentesting Tasks and Tools

Wireless authentication modes

On a wireless network, there are usually three different ways a client device can be authenticated to a wireless router or an access point:

  • Open authentication
  • Shared-key authentication
  • Centralized authentication

The open authentication system is quite simple. The wireless router or AP is not configured with a password, and simply broadcasts its SSID to everyone who is near. A client who wishes to connect can do so freely, without having to provide any sort of credentials or identity before gaining access to the wireless network. An example of using open authentication is the free hotspot service in public areas and venues, such as coffee shops.

Within the shared-key authentication system, the wireless router or AP is configured with a pre-shared key (PSK). This method allows clients to connect to the wireless network only if they can provide the...

bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete