Get Your Free Audiobook

Non-member price: $34.76

After 30 days, Audible is $16.45/mo. Cancel anytime.

Publisher's Summary

Both wired and wireless pen testing have become a key skill among professional hackers using Kali Linux.  

If you want to become a penetration tester, buy this book now and get started today! 

This book bundle includes three books: 

Book 1 - Wireless Technology Fundamentals

Book 2 - Learn Fast How to Hack Any Wireless Networks

Book 3 - Learn Fast How to Hack Like a Pro

Book 1 will cover: 

  • Electromagnetic spectrum, RF basics, antenna types 
  • 2.4 GHz & 5 GHz Band, modulation basics, radio frequency encoding 
  • Influencing RF signals, path loss aka attenuation, signal to interference ratio 
  • Decibels, MIMO technology, beamforming, channel bonding 
  • Beacons, active and passive scanning, frame types 
  • 802.11 a/b/g/n/ac, ax, WiFI 6, 5G networks and more 

Book 2 will cover:
 

  • PenTest tools/wireless adapters and wireless cards for penetration testing 
  •  Vitrual Box & Kali Linux Installation and decrypting traffic with Wireshark 
  • How to implement MITM Attack with Ettercap, how to deploy Rogue Access Point using MITM Attack 
  • How to implement Deauthentication Attack against a Rogue AP 
  • How to deploy Evil Twin Deauthentication Attack with mdk3, how to deploy DoS Attack with MKD3 
  • Four-way handshake and fast roaming process, data protection and data tampering and more....

Book 3 will cover:  

  • Pen Testing at Stage 1, Stage 2, and Stage 3, what penetration testing standards exist 
  • Burp Suite Proxy setup and Spidering hosts, how to deploy SQL Injection with SQLmap 
  • How to implement Dictionary Attack with Airodump-ng, how to deploy ARP Poisoning with EtterCAP 
  • How to capture traffic with Port Mirroring and with Xplico, how to deploy Passive Reconnaissance 
  • How to implement MITM Attack with Ettercap and SSLstrip, how to manipulate packets with Scapy 
  • How to deploy Deauthentication Attack
  • How to capture IPv6 Packets with Parasite6 
  • How to deploy Evil Twin Deauthentication Attack with mdk3
  • The Metasploit Framework 
  • How to deploy DoS Attack with MKD3, how to implement Brute Force Attack with TCP Hydra 
  • How to deploy Armitage Hail Mary, how to use SET a.k.a. Social-Engineering Toolkit and more....

Buy this book now and get started today! 

©2020 Hugo Hoffman (P)2020 Hugo Hoffman

What listeners say about Wireless Hacking Bible

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

No Reviews are Available
Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Luther Coleman
  • Luther Coleman
  • 06-01-2021

Fine book!

I really enjoyed this book. I wasn't sure if I had what it takes to be a hacker. That is until I listen this book! I now can clearly see that I do indeed have the ability to do this. The book covers all of the groundwork you will need to get up to speed quickly. There are many different techniques to be an effective hacker and this book opens up that whole world.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Nathanael Daly
  • Nathanael Daly
  • 06-01-2021

Good!

From a beginner's perspective, there are plenty of books available on the market that all claim to offer an in-depth introduction to Hacking, but many books fail to lay a foundation of knowledge, starting from the basics concepts. The purpose of this book is teach the basic knowledge about preventing possible methods of hacking. I learned several important meaning.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Milana Piper
  • Milana Piper
  • 06-01-2021

Wonderful!

Was looking for a good intro to computer security. Book mentions a lot of great points that everyone should know and use. One bad thing about this book were the hacking labs. The smartphone hack I would not trust or attempt. Seems to be a social engineering attack. However, other labs are practical in the right environment.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Mikhail Bush
  • Mikhail Bush
  • 06-01-2021

Excellent!

This book is basically divided into 3 parts, each parts being very important and independent. The first part simply deals with the history and the world of hacking. The second part on the other hand talks about the functional art of hacking various systems. The third part has to do with ethical hacking; what to do and what not to do.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Yasser Clemons
  • Yasser Clemons
  • 06-01-2021

Nice Book!

It is amazing how much we truly do not know about the world of hackers. This book gave me quite the idea of what hackers of and how they get into our personal information. I never knew that there were as many hackers in the world today and this book helped explain all of the different types and what they do online.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Zakariya Mack
  • Zakariya Mack
  • 06-01-2021

Good One!

This book has seriously been an eye opener. It really delves in to all the ways your personal information, your website, your databases could be at risk. I think everyone with a basic understanding of computers should grab a copy of this so you learn how to protect yourself.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Waseem Rocha
  • Waseem Rocha
  • 06-01-2021

Excellent Book!

Really good book .It is astounding how much we authentically are oblivious to the world of hackers. This book gave me quite the conception of what hackers of and how they get into our personal information. I never kenned that there were as many hackers in the world today and this book availed expound all of the variants and what they do online.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Arlene Mathis
  • Arlene Mathis
  • 06-01-2021

Great Book!

This audio book is a great listen for those who are new to Linux or want to brush up on your Linux knowledge. If you are more advanced or have numerous years of experience using Linux it is a still a great resource, and I found myself learning some new information I had not previously known about! Below are some of the key pros to this audio book:

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Zakariyya Knowles
  • Zakariyya Knowles
  • 06-01-2021

Helpful Book!

This audio book has seriously been an eye opener. It really delves in to all the ways your personal information, your website, your databases could be at risk. I think everyone with a basic understanding of computers should grab a copy of this so you learn how to protect yourself.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Darcey Klein
  • Darcey Klein
  • 06-01-2021

Awesome Book!

I am satisfied to listen this audio book.! This book gave me quite the idea of what hackers of and how they get into our personal information. Overall, a great, practical and educative guide for learning Hacking. Thanks!

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Hayley Phan
  • Hayley Phan
  • 04-01-2021

This book is so informative

This book gives a lot of information about hacking.This book takes you from your very first baby steps in installing Kali all the way to learning the basics of working your way into a network and taking control of a Linux operating system.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Lincoln Haworth
  • Lincoln Haworth
  • 04-01-2021

Greatful to the author, great book !!

That was a very learn-able book, I very interested to learning Hacking, this is a perfect book for me. I am following this book step by step instruction overall great information found.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Elana Griffith
  • Elana Griffith
  • 04-01-2021

A great intro into the world of ethical hacking.

I see this book as more helpful than Kali Linux Revealed. I am partially through the activities and I have taken in a great deal.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Ignacy Ruiz
  • Ignacy Ruiz
  • 04-01-2021

If you want to learn more about hacking listen it,

This book takes you from your very first baby steps in installing Kali all the way to learning the basics of working your way into a network and taking control of a Linux.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Keely Gaines
  • Keely Gaines
  • 04-01-2021

Great audiobook..!!

That was an exceptionally enlightening book. This book gives a great deal of data about hacking. This book takes you from your absolute first small steps in introducing Kali right to learning the essentials of working your way into a system and assuming responsibility for a Linux situation.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Blake Kline
  • Blake Kline
  • 04-01-2021

I enjoyed listen this book.

I particularly adored the manner in which the book conveys express regions to help make discipline and after each portion the writer audits the basic take-sways.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Mira Sears
  • Mira Sears
  • 04-01-2021

Useful book

A helpful guide on Kali Linux and covers some other essentials you'll need to know if you're wanting to know about hacking.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Francesca Cullen
  • Francesca Cullen
  • 04-01-2021

Informative Book!!!!!

This manual makes understanding clear through all-around referenced offered courses, to make Learning principal. Conley Walsh presented hacking nuts and bolts.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Tulisa Leech
  • Tulisa Leech
  • 04-01-2021

Overall great book.

This book gave maine quite the thought of what hackers of and the way they get into our personal info. This book can teach you ways to use it to accomplish specifically what you would like to in your hacking career.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Dru Mcguire
  • Dru Mcguire
  • 04-01-2021

This book is so informative.

This book causes me to profoundly make a few informed investigations effectively. Very detailed and precise instructions Kali Linux. Really enjoyed it.

In the spirit of reconciliation, Audible Australia acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.