Hacking exposed wireless wireless security secrets & solutions

Overview: Exploit and defend against the latest wireless network attacks. Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deplo...

Full description

Saved in:
Bibliographic Details
Main Authors: Wright, Joshua (Author), Cache, Johnny (Author)
Format: Book
Language:English
Published: New York, NY McGraw-Hill Education [2015]
Edition:Third edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Introduction
  • Part I: Hacking 802.11 Wireless Technology
  • Case Study: Twelve Volt Hero
  • 1 Introduction to 802.11 Hacking
  • 2 Scanning and Enumerating 802.11 Networks
  • 3 Attacking 802.11 Wireless Networks
  • 4 Attacking WPA-Protected 802.11 Networks
  • 5 Attacking 802.11 Wireless Clients
  • 6 Taking It All the Way: Bridging the Air-Gap from Windows 8
  • Part II: Bluetooth
  • Case Study: You Can Still Hack What You Can't See
  • 7 Bluetooth Classic Scanning and Reconnaissance
  • 8 Bluetooth Low Energy Scanning and Reconnaissance
  • 9 Bluetooth Eavesdropping
  • 10 Attacking and Exploiting Bluetooth
  • Part III: More Ubiquitous Wireless
  • Case Study: Failure Is Not an Option
  • 11 Software-Defined Radios
  • 12 Hacking Cellular Networks
  • 13 Hacking ZigBee
  • 14 Hacking Z-Wave Smart Homes