Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
Audiobook2 hours

Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test

Written by Peter Bradley

Narrated by Jim D Johnston

Rating: 5 out of 5 stars

5/5

()

About this audiobook

As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.

Thankfully, there is a solution and it lies in penetration testing. A form of ethical hacking, penetration testing is a skill that you should learn, especially wireless-penetration testing and this has become more important than ever as new ways are being discovered to break into WPA2-encrypted networks.

With Kali Linux, you have all the tools you need and in Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing, you will learn, with detailed step-by-step practical examples how to protect your network from being hacked.

In this book, you'll learn:

  • How to set up a wireless lab to test your system
  • What the KRACK attack is
  • How to sniff out hidden networks, wireless packets and SSIDs
  • How to capture WPA-2 keys and crack them
  • How to attack a radius authentication system
  • How to sniff traffic on a wireless network
  • How to use stolen keys to decrypt encrypted traffic
  • What the Honeypot and Deauthentication attacks are
  • What Man-In-The-Middle and DoS attacks are
  • How to secure your own wireless network

What are you waiting for? Buy Now to get started today to learn how to protect your system from the latest and most sophisticated attacks.

LanguageEnglish
PublisherPeter Bradley
Release dateSep 9, 2019
ISBN9781094224428
Author

Peter Bradley

Peter Bradley was the Labour MP for The Wrekin between 1997 and 2005. More recently, he co-founded and directed Speakers’ Corner Trust, a charity which promotes freedom of expression, open debate and active citizenship in the UK and developing democracies. He has written, usually on politics, for a wide range of publications, including The Times, The Guardian, The Independent, The New Statesman and The New European.

More audiobooks from Peter Bradley

Related authors

Related to Hacking

Related audiobooks

Security For You

View More

Related articles

Reviews for Hacking

Rating: 5 out of 5 stars
5/5

1 rating0 reviews

What did you think?

Tap to rate

Review must be at least 10 words