WarDriving and Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.
* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.
* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 3 WarDriving with Handheld Devices and Direction Finding
Chapter 4 WarDriving and Penetration Testing with Windows
Chapter 5 WarDriving and Penetration Testing with Linux
Chapter 6 WarDriving and Wireless Penetration Testing with OS X
Chapter 7 Wireless Penetration Testing Using a Bootable Linux Distribution
Chapter 8 Mapping WarDrives
Chapter 9 Using ManintheMiddle Attacks to Your Advantage
Chapter 10 Using Custom Firmware for Wireless Penetration Testing
Chapter 11 Wireless Video Testing
Appendix A Solutions Fast Track
Appendix B Device Driver Auditing
The Definition of a Serious Security Library
Other editions - View all
11 Mbps Linksys Aircrack AirCrack-ng Beacon frame Bluetooth Broadcast IEEE 802 bytes cable capture channel chapter chipset Cisco configuration connect connector CoWPAtty crack dan-attack deauthentication default device drivers dictionary attack directional antenna Dnsmasq encryption external antenna Figure filtering firmware following command GPSD GPSMap handheld hardware Host AP identify install interface IP address ipkg iptables ISBN iwconfig kernel Kismac Kismet KisNAAC laptop Linksys Linux MAC address Mappoint Mbps Linksys AP MiniStumbler MITM attack mode NetStumbler nvram omnidirectional OpenWRT operating system options packages packets password penetration test Protocol radio range scan server signal SSID StumbVerter target access point target AP tester traffic vulnerabilities WarDriving WEP key WiFi Windows wireless access points wireless card wireless client wireless network wireless penetration test wireless video WLAN WLAN discovery WPA-PSK Zaurus