|
Book details / order |
HACKING EXPOSED WIRELESS |
Secure your wireless networks the hacking exposed way
defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. hacking exposed wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. find out how to plug security holes in wi-fi/802.11 and bluetooth systems and devices. you'll also learn how to launch wireless exploits from metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. the book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.
understand the concepts behind rf electronics, wi-fi/802.11, and bluetooth
find out how hackers use netstumbler, wispy, kismet, kismac, and airopeek to target vulnerable wireless networks
defend against wep key brute-force, aircrack, and traffic injection hacks
crack wep at new speeds using field programmable gate arrays or your spare ps3 cpu cycles
prevent rogue ap and certificate authentication attacks
perform packet injection from linux
launch dos attacks using device driver-independent tools
exploit wireless device drivers using the metasploit 3.0 framework
identify and avoid malicious hotspots
deploy wpa/802.11i authentication and encryption using peap, freeradius, and wpa pre-shared keys.
new features:
how attackers identify and exploit wireless network weaknesses so you can locate, exploit and defend wireless systems
the tools and techniques hackers use to penetrate wireless networks today
written with a focus on the real-world enterprise environment, with situations and solutions taken from field experiences.
advanced 802.11 attacks, including some new unpublished attacks debuted here
directed attacks against wireless network access points used to gain total control over the wireless environment
advanced penetration techniques for bluetooth enabled devices in addition to 3g wireless application attacks
the only wireless security book that covers the spectrum of wireless technolies: wifi/802.11, bluetooth, irda, 3g wireless, rfid, wimax and more are covered.
table of contents:
part i: overview
chapter 1: wireless security overview
chapter 2: radio frequency
part ii: hacking 802.11 wireless technology
chapter 3: introduction to 802.11
chapter 4: 802.11 discovery
chapter 5: scanning and enumerating 802.11 networks
chapter 6: attacking 802.11 networks
chapter 7: attacking wpa-protected 802.11 networks
chapter 8: 802.11 defense
part iii: hacking additional wireless technologies
chapter 9: hacking hotspots
chapter 10: the potential threat of bluetooth
chapter 11: advanced attacks
Author : Cache, johnny; liu, vincent
Publication : Tata
Isbn : 978-0-07-065906-3
Store book number : 106
NRS 792.00
|
|
|
|
|
|
|
|
|
|