Hacking exposed wireless : wireless security secrets & solutions
"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, includi...
Main Authors: | , , |
---|---|
Format: | Book |
Language: | English |
Published: |
New York :
McGraw-Hill ,
c2010
|
Edition: | 2nd ed |
Series: | Hacking exposed
|
Subjects: | |
Online Access: | Companion website with bonus materials including source code, scripts, and high-resolution images : |
Table of Contents:
- 1. Introduction to 802.11 hacking
- 2. Scanning and enumerating 802.11 networks
- 3. Attacking 802.11 wireless networks
- 4. Attacking WPA-protected 802.11 networks
- 5. Attack 802.11 wireless clients
- 6. Taking it all the way : bridging the airgap from OS X
- 7. Taking it all the way : bridging the airgap from Windows
- 8. Bluetooth scanning and reconnaissance
- 9. Bluetooth eavesdropping
- 10. Attacking and exploiting bluetooth
- 11. Hack ZigBee
- 12. Hack DECT