Image from Coce

Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu.

By: Contributor(s): Material type: TextTextSeries: Hacking exposedPublisher: New York : McGraw-Hill, [2010]Copyright date: ©2010Edition: Second editionDescription: xxv, 484 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 0071666613
  • 9780071666619
Other title:
  • Wireless
Subject(s): DDC classification:
  • 621.382 22
LOC classification:
  • TK5103.2 .C23 2010
Contents:
PART I: HACK 802.11 WIRELESS TECHNOLOGY 1 Introduction to 802.11 Hacking ; 2 Scanning and Enumerating 802.11 Networks ; 3 Attacking 802.11 Wireless Networks ; 4 Attacking WPA-protected 802.11 Networks PART II: HACK 802.11 CLIENTS 5 Attack 802.11 Wireless Clients ; 6 Taking it All the Way: Bridging the Airgap from OS X ; 7 Taking it All the Way: Bridge the Airgap from Windows PART III: HACK ADDITIONAL WIRELESS TECHNOLOGIES 8 Bluetooth Scanning and Reconnaissance ; 9 Bluetooth Eavesdropping ; 10 Attacking and Exploiting Bluetooth ; 11 Hack Zigbee ; 12 Hack DECT.
Summary: "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book City Campus City Campus Main Collection 621.382 CAC (Browse shelf(Opens below)) 1 Available A454660B

A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com .

Includes bibliographical references and index.

PART I: HACK 802.11 WIRELESS TECHNOLOGY 1 Introduction to 802.11 Hacking ; 2 Scanning and Enumerating 802.11 Networks ; 3 Attacking 802.11 Wireless Networks ; 4 Attacking WPA-protected 802.11 Networks PART II: HACK 802.11 CLIENTS 5 Attack 802.11 Wireless Clients ; 6 Taking it All the Way: Bridging the Airgap from OS X ; 7 Taking it All the Way: Bridge the Airgap from Windows PART III: HACK ADDITIONAL WIRELESS TECHNOLOGIES 8 Bluetooth Scanning and Reconnaissance ; 9 Bluetooth Eavesdropping ; 10 Attacking and Exploiting Bluetooth ; 11 Hack Zigbee ; 12 Hack DECT.

"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]

Machine converted from AACR2 source record.

There are no comments on this title.

to post a comment.

Powered by Koha