|
![]() |
|||
|
||||
OverviewThis book offers a real solution for all those who love cybersecurity and hacking on Wi-Fi / 802.11 technologies, those who want to learn how to easily program their own tools for pentesting or auditing wireless networks. During the recent years Python has reached a prominent position as one of the bests programming languages for the pentesting, thanks to its simplicity and its wide capabilities. The large number of modules, libraries and examples publicly available permit to easily code any kind of application. Scapy is the most complete network module for Python, and allows analyzing, dissecting, forging and injecting any frame over any existing network protocol. The scarcity of documentation on Scapy Dot11 makes this book a unique tool for all professionals, hackers, pentesters, security analysts and cyberforenses who wish to create their own arsenal of Wi-Fi penetration tools. The format of this book offers a first section which covers a theoretical introduction about Wi-Fi networks and their operating structure. The second part, eminently practical, presents a selection of more than 40 selected Python programmed scripts that use the Scapy library to perform Hacking and Pentesting Wi-Fi operations. Full Product DetailsAuthor: Yago HansenPublisher: Createspace Independent Publishing Platform Imprint: Createspace Independent Publishing Platform Dimensions: Width: 17.80cm , Height: 1.30cm , Length: 25.40cm Weight: 0.440kg ISBN: 9781722351496ISBN 10: 1722351497 Pages: 250 Publication Date: 03 July 2018 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationEthical hacker, expert in IT systems and network engineering, with extensive experience in infrastructures of all sizes. During the last decade he has specialized extensively in wireless technologies, successfully managing dozens of projects for security planning, implementation and auditing. He has successfully managed several projects based on cybersecurity that are currently under production, through the creation of embedded Linux based systems. During his professional career, he has carried out international projects for large corporations in the banking, insurance, telecommunications operators, State security and defense sectors. In the field of hacking, he carries out regular interventions in the press and congresses, as well as lectures and training cycles for several universities. He has published numerous technical publications and articles for specialized magazines, in addition to collaborating with some publishers through which he has written and published numerous books on computer security and infrastructure. For some years now, he has been a regular trainer in cybersecurity and cyber defense issues for intelligence, defense and national security departments of many governments. Tab Content 6Author Website:Countries AvailableAll regions |