Become a cyber-hero – know the common wireless weaknesses
‘Reading a book like this one is a worthy endeavor toward
becoming an experienced wireless security professional.’
–Devin Akin – CTO, The Certified Wireless Network Professional
(CWNP) Program
Wireless networks are so convenient – not only for you, but also
for those nefarious types who’d like to invade them. The only way
to know if your system can be penetrated is to simulate an attack.
This book shows you how, along with how to strengthen any weak
spots you find in your network’s armor.
Discover how to:
* Perform ethical hacks without compromising a system
* Combat denial of service and WEP attacks
* Understand how invaders think
* Recognize the effects of different hacks
* Protect against war drivers and rogue devices
İçerik tablosu
Foreword xvii
Introduction 1
Part I: Building the Foundation for Testing Wireless Networks 7
Chapter 1: Introduction to Wireless Hacking 9
Chapter 2: The Wireless Hacking Process 19
Chapter 3: Implementing a Testing Methodology 31
Chapter 4: Amassing Your War Chest 43
Part II: Getting Rolling with Common Wi-Fi Hacks 65
Chapter 5: Human (In)Security 67
Chapter 6: Containing the Airwaves 81
Chapter 7: Hacking Wireless Clients 97
Chapter 8: Discovering Default Settings 113
Chapter 9: Wardriving 131
Part III: Advanced Wi-Fi Hacks 153
Chapter 10: Still at War 155
Chapter 11: Unauthorized Wireless Devices 177
Chapter 12: Network Attacks 195
Chapter 13: Denial-of-Service Attacks 225
Chapter 14: Cracking Encryption 255
Chapter 15: Authenticating Users 281
Part IV: The Part of Tens 301
Chapter 16: Ten Essential Tools for Hacking Wireless Networks 303
Chapter 17: Ten Wireless Security-Testing Mistakes 307
Chapter 18: Ten Tips for Following Up after Your Testing 321
Part V: Appendixes 325
Appendix A: Wireless Hacking Resources 327
Appendix B: Glossary of Acronyms 341
Index 347
Yazar hakkında
Kevin Beaver, CISSP, is a 16-year specialist in security
assessments and incident response.
Peter T. Davis, CISSP, has worked with information
systems audits and security for 24 years.