Wireless Reconnaissance in Penetration Testing

Front Cover
Newnes, Dec 31, 2012 - Computers - 226 pages

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.

  • Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testing
  • Includes real-world case studies of actual penetration tests using radio profiling
  • Covers data leakage, frequency, attacks, and information gathering
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

1 Why Radio Profiling?
1
2 Basic Radio Theory and Introduction to Radio Systems
7
3 Targets
45
4 Offsite Profiling
49
5 Onsite Radio Profiling
65
Who is Guarding the Guards?
87
Monitoring Phone Calls
88
Wireless Cameras
89
Introduction
119
Out in the Field
121
Glitz and Glamour
122
Learning the Local Lingo
123
Inside
124
Everything is Going Digital
127
SoftwareDefined Radios SDRs
133
NetworkEnabled Dispatch Systems
148

Common Scanner Controls and Features
91
Selecting a Scanner
94
Scanners Recommended for Wireless Reconnaissance
105
Helpful Accessories
107
Conclusions and Looking Forward
150
Glossary
153
Index
161
Copyright

Other editions - View all

Common terms and phrases

About the author (2012)

Matthew Neely (CISSP, CTGA, GCIH, GCWN) is the Profiling Team Manager at SecureState, a Cleveland, Ohio-based security consulting company.

Alex Hamerstone, CTGA - Security Consultant, Risk Management.

Chris Sanyk is a journeyman IT professional with over twelve years of experience with everything from desktop publishing and web design, to user support, to system administration, to software development. In his spare time, he blogs and develops video games at his website, csanyk.com.

Bibliographic information