Hacking Exposed Wireless - Johnny Cache, Vincent Liu

Hacking Exposed Wireless

Buch | Softcover
386 Seiten
2007
McGraw-Hill Professional (Verlag)
978-0-07-226258-2 (ISBN)
43,60 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Covers real, tactical wireless security implementation. This title shows how to execute the attacks and implement the defenses. It is suitable for IT professional who works with wireless technology.
Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.



Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
Defend against WEP key brute-force, aircrack, and traffic injection hacks
Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
Prevent rogue AP and certificate authentication attacks
Perform packet injection from Linux
Launch DoS attacks using device driver-independent tools
Exploit wireless device drivers using the Metasploit 3.0 Framework
Identify and avoid malicious hotspots
Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

Johnny Cache (Virginia) received his Masters in Computer Science from the Naval Postgraduate School in 2006. His thesis work, which focused on fingerprinting 802.11 device drivers, won the Gary Kildall award for the most innovative computer science thesis. Johnny wrote his first program on a Tandy 128K color computer sometime in 1988. Since then he has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. He has also released a number of papers related to 802.11 security, and is the author of many wireless tools. He is the founder and Chief Science Officer of Cache Heavy Industries. McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide

Part I: OverviewChapter 1: Wireless Security OverviewChapter 2: Radio FrequencyPart II: Hacking 802.11 Wireless TechnologyChapter 3: Introduction to 802.11 Chapter 4: 802.11 DiscoveryChapter 5: Scanning and Enumerating 802.11 NetworksChapter 6: Attacking 802.11 NetworksChapter 7: Attacking WPA-protected 802.11 NetworksChapter 8: 802.11 DefensePart III: Hacking Additional Wireless TechnologiesChapter 9: Hacking HotspotsChapter 10: The Potential Threat of BluetoothChapter 11: Advanced AttacksIndex

Erscheint lt. Verlag 16.5.2007
Reihe/Serie Hacking Exposed
Zusatzinfo 100 Illustrations, unspecified
Sprache englisch
Maße 188 x 234 mm
Gewicht 698 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-07-226258-3 / 0072262583
ISBN-13 978-0-07-226258-2 / 9780072262582
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
94,95