|
![]() |
|||
|
||||
OverviewSecure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys Full Product DetailsAuthor: Johnny Cache , Vincent Liu , James Foster , Jon EllchPublisher: McGraw-Hill Education - Europe Imprint: McGraw-Hill Professional Dimensions: Width: 18.80cm , Height: 2.40cm , Length: 23.40cm Weight: 0.698kg ISBN: 9780072262582ISBN 10: 0072262583 Pages: 386 Publication Date: 16 May 2007 Audience: Professional and scholarly , Professional & Vocational Replaced By: 9780071666619 Format: Paperback Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsPart I: Overview Chapter 1: Wireless Security Overview Chapter 2: Radio Frequency Part II: Hacking 802.11 Wireless Technology Chapter 3: Introduction to 802.11 Chapter 4: 802.11 Discovery Chapter 5: Scanning and Enumerating 802.11 Networks Chapter 6: Attacking 802.11 Networks Chapter 7: Attacking WPA-protected 802.11 Networks Chapter 8: 802.11 Defense Part III: Hacking Additional Wireless Technologies Chapter 9: Hacking Hotspots Chapter 10: The Potential Threat of Bluetooth Chapter 11: Advanced Attacks IndexReviewsAuthor InformationJohnny Cache (Virginia) received his Masters in Computer Science from the Naval Postgraduate School in 2006. His thesis work, which focused on fingerprinting 802.11 device drivers, won the Gary Kildall award for the most innovative computer science thesis. Johnny wrote his first program on a Tandy 128K color computer sometime in 1988. Since then he has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. He has also released a number of papers related to 802.11 security, and is the author of many wireless tools. He is the founder and Chief Science Officer of Cache Heavy Industries. McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide Tab Content 6Author Website:Countries AvailableAll regions |