TY - BOOK AU - Cache,Johnny AU - Wright,Joshua AU - Liu,Vincent TI - Hacking exposed wireless: wireless security secrets & solutions T2 - Hacking exposed SN - 0071666613 AV - TK5103.2 .C23 2010 U1 - 621.382 22 PY - 2010///] CY - New York PB - McGraw-Hill KW - Wireless communication systems KW - Security measures KW - Wireless LANs N1 - A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com; Includes bibliographical references and index; PART I: HACK 802.11 WIRELESS TECHNOLOGY 1 Introduction to 802.11 Hacking ; 2 Scanning and Enumerating 802.11 Networks ; 3 Attacking 802.11 Wireless Networks ; 4 Attacking WPA-protected 802.11 Networks PART II: HACK 802.11 CLIENTS 5 Attack 802.11 Wireless Clients ; 6 Taking it All the Way: Bridging the Airgap from OS X ; 7 Taking it All the Way: Bridge the Airgap from Windows PART III: HACK ADDITIONAL WIRELESS TECHNOLOGIES 8 Bluetooth Scanning and Reconnaissance ; 9 Bluetooth Eavesdropping ; 10 Attacking and Exploiting Bluetooth ; 11 Hack Zigbee ; 12 Hack DECT N2 - "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4] ER -