• Hacking with Kali Linux: Wireless Penetration

  • A Beginner's Guide with Practical Examples to Learn to Create a Wireless Lab for Experiments, Sniff Out Hidden Networks and Attack Authentication Systems
  • By: Grzegorz Nowak
  • Narrated by: Jordan Blom
  • Length: 3 hrs and 24 mins
  • 4.8 out of 5 stars (12 ratings)

1 title per month from Audible’s entire catalog of best sellers, and new releases.
Access a growing selection of included Audible Originals, audiobooks and podcasts.
You will get an email reminder before your trial ends.
Your Premium Plus plan is $14.95 a month after 30 day trial. Cancel anytime.
Buy for $14.95

Buy for $14.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Do you enjoy working with a wireless network, where you are able to take your computer and your work with you everywhere you go? 

Do you want to be able to protect your valuable information and any other important data that is on your system and keep it away from a hacker who wants to use it maliciously? 

Would you like to be able to protect your system and learn more about the different methods hackers can use to get onto your computer through your wireless network?

Wireless networks have changed the way that we are able to interact with our systems and with technology. In the past, we relied on a wired service that kept us in one place or jumping from one computer to the next. Today, most devices, including phones, tablets, and computers, are mobile and can be used anywhere, thanks to the wireless network that seems to be everywhere. While this is great news for most people, we have to be aware that there are some problems that can arise and any vulnerabilities that a hacker would like to take advantage of. 

In this book, we are going to take a look at some of the ways that we can learn about wireless penetration and how a hacker is able to get onto your system and take advantage, often without you having any idea. Learning how this kind of penetration can happen and how we are able to avoid it as much as possible can make it so much easier for us to keep our information safe on our own system. 

Some of the topics that we are going to take in order to handle our wireless network and to make sure that we are going to keep our information safe, includes:

  • An overview of wireless networking and some of the basics to help us get started 
  • Steps to set up our methodology with wireless hacking and organizing all of the tools that we need
  • Methods to get ourselves past all of the different types of encryption online
  • Ways to exploit a wireless network
  • Steps to handle a wireless denial of service attack
  • The role of VPNs and firewalls in place to keep your network safe
  • The basics of cybersecurity and how you can use this to keep the hackers out
  • The different types of cyberattacks and malware operate
  • The consequences of a cyber-attack and why we need to prevent it before it ever starts
  • The basic steps you need to take in order to scan your own network and keep hackers out

While our wireless networks are helping to make things easier and allowing us to be more mobile with our work, they do bring up some big vulnerabilities that hackers love to try and get through. When you are ready to learn about wireless hacking and how to keep your own network safe and sound, make sure to check out this audiobook to help you get started. 

©2019 Grzegorz Nowak (P)2019 Grzegorz Nowak

What listeners say about Hacking with Kali Linux: Wireless Penetration

Average Customer Ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    11
  • 4 Stars
    0
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 5 out of 5 stars
  • 5 Stars
    11
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 5 out of 5 stars
  • 5 Stars
    11
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

I really appreciate this audible

I was a starter in Kali Linux before reading the audio book. Now I feel myself more experience because actually, I was expecting only the intro to Kali Linux.

4 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Very Helpful

Great examples. Grzegorz Nowak was a great instructor and his published works are very much like his online courses.

4 people found this helpful

  • Overall
    3 out of 5 stars

protect your system

decent book Informative for people who want to protect against attacks. it explains a bit about how to penetrate wifi but mainly focus on the protection part

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

I would must suggest this audible to anyone

It is a decent match for a audio book I wanted to listen. I know that I’m learning this a few years late all that info but finally I found the time. The audio book has a ton of practical information in it.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

I think this book is the best book of the topic

If you have never done anything like before and are a total beginner then this audio book is perfect for you. Very clear instructions, examples. Everything is structured perfectly for me to go and refresh myself later.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Extremely Prescribed Audio Book

I'm only about halfway through this audiobook. It is very interesting and informative. I am enjoying it very much. I think it is exceptionally beneficial on the chance that you pursued well and accustomed to it.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

This audio book brought awesome achievements

Great for those who want to get their bearings regarding this complex subject. Well deserving the money for the information. I just finished listening to this book very informative for a beginner like myself.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Effective Tune!!

I have a Red Hat Linux certification that has served me well. I began a new job that consisted of penetration testing. I needed to learn new languages to be effective in my position and Kali Linux was one of them

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Awesome!!

If you're familiar with computing generally, especially Linux, and want to know about Kali, this is a solid introduction to a complex subject and the author explains all the major topics very clearly. It's obviously an enormous topic but the book successfully navigates the areas that a newcomer will want to understand and provides plenty of learning resources for going further on any given area. As another reviewer has noted, the screenshot quality isn't great but doesn't really impact the listener greatly. I'd highly recommend this for anyone interested in ethical hacking or security.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Excellent Written

This is an excellently written, and interesting technical resource book for learning and relearning Kali. The writing is concise and useful for new learners and old security hands in information Assurance. The book has considerable utility in teaching pen testing methods and best practices. The price and value proposition is excellent.