Listen free for 30 days

Listen with a free trial

One credit a month, good for any title to download and keep.
Unlimited listening to the Plus Catalogue - thousands of select Audible Originals, podcasts and audiobooks.
Exclusive member-only deals.
No commitment - cancel anytime.
Buy Now for £22.89

Buy Now for £22.89

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

Summary

Both wired and wireless pen testing have become a key skill among professional hackers using Kali Linux.  

If you want to become a penetration tester, buy this book now and get started today! 

This book bundle includes three books: 

Book 1 - Wireless Technology Fundamentals

Book 2 - Learn Fast How to Hack Any Wireless Networks

Book 3 - Learn Fast How to Hack Like a Pro

Book 1 will cover: 

  • Electromagnetic spectrum, RF basics, antenna types 
  • 2.4 GHz & 5 GHz Band, modulation basics, radio frequency encoding 
  • Influencing RF signals, path loss aka attenuation, signal to interference ratio 
  • Decibels, MIMO technology, beamforming, channel bonding 
  • Beacons, active and passive scanning, frame types 
  • 802.11 a/b/g/n/ac, ax, WiFI 6, 5G networks and more 

Book 2 will cover:
 

  • PenTest tools/wireless adapters and wireless cards for penetration testing 
  •  Vitrual Box & Kali Linux Installation and decrypting traffic with Wireshark 
  • How to implement MITM Attack with Ettercap, how to deploy Rogue Access Point using MITM Attack 
  • How to implement Deauthentication Attack against a Rogue AP 
  • How to deploy Evil Twin Deauthentication Attack with mdk3, how to deploy DoS Attack with MKD3 
  • Four-way handshake and fast roaming process, data protection and data tampering and more....

Book 3 will cover:  

  • Pen Testing at Stage 1, Stage 2, and Stage 3, what penetration testing standards exist 
  • Burp Suite Proxy setup and Spidering hosts, how to deploy SQL Injection with SQLmap 
  • How to implement Dictionary Attack with Airodump-ng, how to deploy ARP Poisoning with EtterCAP 
  • How to capture traffic with Port Mirroring and with Xplico, how to deploy Passive Reconnaissance 
  • How to implement MITM Attack with Ettercap and SSLstrip, how to manipulate packets with Scapy 
  • How to deploy Deauthentication Attack
  • How to capture IPv6 Packets with Parasite6 
  • How to deploy Evil Twin Deauthentication Attack with mdk3
  • The Metasploit Framework 
  • How to deploy DoS Attack with MKD3, how to implement Brute Force Attack with TCP Hydra 
  • How to deploy Armitage Hail Mary, how to use SET a.k.a. Social-Engineering Toolkit and more....

Buy this book now and get started today! 

©2020 Hugo Hoffman (P)2020 Hugo Hoffman

What listeners say about Wireless Hacking Bible

Average customer ratings
Overall
  • 4 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    6
  • 3 Stars
    2
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 4 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    6
  • 3 Stars
    2
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 4 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    6
  • 3 Stars
    2
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    3 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    3 out of 5 stars

This book is massive in scope and in composition,

This book is massive in scope and in composition, but is written so that even the biggest dummy can reap the knowledge it has on its pages. I am a Network Security college student.

  • Overall
    3 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    3 out of 5 stars

This book is amazing for me!

This book is amazing for me! It taught me a lot about Computer Networking. This book is very detailed and well explained!

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

This was a super interesting book.

This was a super interesting book. Easy to listen, lots of information, I'd definitely recommend this to anyone who wants to learn more about networking.

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

This is a great book for those currently

This is a great book for those currently in career transition, and those who think they may be soon! A definite add to your library! A must for anyone serious about landing a great job.

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

This is an extraordinary audio book.

I recommend this audible and would listen to more audible from this author. Everything was spoken in this audible makes sense, definitely a good listen!

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

This book give you a basic understanding

This book give you a basic understanding of networking and setting up routers and switches. It even has links to a

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

Great for learning computer network infrastructur

The information covers a broad range of topics; however, remains detailed enough to give a thorough explanation.

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

This book is among the best books

This book is among the best books I have ever listen about networking fundamentals, it cover all the basics and also put your hands on some Cisco routing labs. Good book I highly recommend it.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Luther Coleman
  • Luther Coleman
  • 06-01-21

Fine book!

I really enjoyed this book. I wasn't sure if I had what it takes to be a hacker. That is until I listen this book! I now can clearly see that I do indeed have the ability to do this. The book covers all of the groundwork you will need to get up to speed quickly. There are many different techniques to be an effective hacker and this book opens up that whole world.

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Nathanael Daly
  • Nathanael Daly
  • 06-01-21

Good!

From a beginner's perspective, there are plenty of books available on the market that all claim to offer an in-depth introduction to Hacking, but many books fail to lay a foundation of knowledge, starting from the basics concepts. The purpose of this book is teach the basic knowledge about preventing possible methods of hacking. I learned several important meaning.

1 person found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Milana Piper
  • Milana Piper
  • 06-01-21

Wonderful!

Was looking for a good intro to computer security. Book mentions a lot of great points that everyone should know and use. One bad thing about this book were the hacking labs. The smartphone hack I would not trust or attempt. Seems to be a social engineering attack. However, other labs are practical in the right environment.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Mikhail Bush
  • Mikhail Bush
  • 06-01-21

Excellent!

This book is basically divided into 3 parts, each parts being very important and independent. The first part simply deals with the history and the world of hacking. The second part on the other hand talks about the functional art of hacking various systems. The third part has to do with ethical hacking; what to do and what not to do.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Yasser Clemons
  • Yasser Clemons
  • 06-01-21

Nice Book!

It is amazing how much we truly do not know about the world of hackers. This book gave me quite the idea of what hackers of and how they get into our personal information. I never knew that there were as many hackers in the world today and this book helped explain all of the different types and what they do online.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Zakariya Mack
  • Zakariya Mack
  • 06-01-21

Good One!

This book has seriously been an eye opener. It really delves in to all the ways your personal information, your website, your databases could be at risk. I think everyone with a basic understanding of computers should grab a copy of this so you learn how to protect yourself.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Waseem Rocha
  • Waseem Rocha
  • 06-01-21

Excellent Book!

Really good book .It is astounding how much we authentically are oblivious to the world of hackers. This book gave me quite the conception of what hackers of and how they get into our personal information. I never kenned that there were as many hackers in the world today and this book availed expound all of the variants and what they do online.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Arlene Mathis
  • Arlene Mathis
  • 06-01-21

Great Book!

This audio book is a great listen for those who are new to Linux or want to brush up on your Linux knowledge. If you are more advanced or have numerous years of experience using Linux it is a still a great resource, and I found myself learning some new information I had not previously known about! Below are some of the key pros to this audio book:

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Zakariyya Knowles
  • Zakariyya Knowles
  • 06-01-21

Helpful Book!

This audio book has seriously been an eye opener. It really delves in to all the ways your personal information, your website, your databases could be at risk. I think everyone with a basic understanding of computers should grab a copy of this so you learn how to protect yourself.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Darcey Klein
  • Darcey Klein
  • 06-01-21

Awesome Book!

I am satisfied to listen this audio book.! This book gave me quite the idea of what hackers of and how they get into our personal information. Overall, a great, practical and educative guide for learning Hacking. Thanks!