Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu.
Material type: TextSeries: Hacking exposedPublisher: New York : McGraw-Hill, [2010]Copyright date: ©2010Edition: Second editionDescription: xxv, 484 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 0071666613
- 9780071666619
- Wireless
- 621.382 22
- TK5103.2 .C23 2010
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Book | City Campus City Campus Main Collection | 621.382 CAC (Browse shelf(Opens below)) | 1 | Available | A454660B |
Browsing City Campus shelves, Shelving location: City Campus Main Collection Close shelf browser (Hides shelf browser)
621.3815483 HIC Oscilloscopes : how to use them, how they work / | 621.3815486 ATA Integrated frequency synthesis for convergent wireless solutions / | 621.38159 REF Reference-free CMOS Pipeline Analog-to-digital Converters / | 621.382 CAC Hacking exposed wireless : wireless security secrets & solutions / | 621.382 COU Digital and analog communication systems / | 621.382 CRC CRC handbook of modern telecommunications / | 621.382 FRE Fundamentals of telecommunications / |
A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com .
Includes bibliographical references and index.
PART I: HACK 802.11 WIRELESS TECHNOLOGY 1 Introduction to 802.11 Hacking ; 2 Scanning and Enumerating 802.11 Networks ; 3 Attacking 802.11 Wireless Networks ; 4 Attacking WPA-protected 802.11 Networks PART II: HACK 802.11 CLIENTS 5 Attack 802.11 Wireless Clients ; 6 Taking it All the Way: Bridging the Airgap from OS X ; 7 Taking it All the Way: Bridge the Airgap from Windows PART III: HACK ADDITIONAL WIRELESS TECHNOLOGIES 8 Bluetooth Scanning and Reconnaissance ; 9 Bluetooth Eavesdropping ; 10 Attacking and Exploiting Bluetooth ; 11 Hack Zigbee ; 12 Hack DECT.
"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
Machine converted from AACR2 source record.
There are no comments on this title.