Hacking exposed wireless wireless security secrets & solutions
Overview: Exploit and defend against the latest wireless network attacks. Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deplo...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York, NY
McGraw-Hill Education
[2015]
|
| Edition: | Third edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Introduction
- Part I: Hacking 802.11 Wireless Technology
- Case Study: Twelve Volt Hero
- 1 Introduction to 802.11 Hacking
- 2 Scanning and Enumerating 802.11 Networks
- 3 Attacking 802.11 Wireless Networks
- 4 Attacking WPA-Protected 802.11 Networks
- 5 Attacking 802.11 Wireless Clients
- 6 Taking It All the Way: Bridging the Air-Gap from Windows 8
- Part II: Bluetooth
- Case Study: You Can Still Hack What You Can't See
- 7 Bluetooth Classic Scanning and Reconnaissance
- 8 Bluetooth Low Energy Scanning and Reconnaissance
- 9 Bluetooth Eavesdropping
- 10 Attacking and Exploiting Bluetooth
- Part III: More Ubiquitous Wireless
- Case Study: Failure Is Not an Option
- 11 Software-Defined Radios
- 12 Hacking Cellular Networks
- 13 Hacking ZigBee
- 14 Hacking Z-Wave Smart Homes


