Book description
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.
* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.
* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
Table of contents
- Cover image
- Title page
- Table of Contents
- VISIT US AT
- Copyright
- Acknowledgments
- Technical Editor and Lead Author
- Technical Editor and Contributing Author
- Contributing Authors
- Foreword Contributor
- Foreword
- Foreword v 1.0
- Chapter 1: Introduction to WarDriving and Penetration Testing
- Chapter 2: Understanding Antennas and Antenna Theory
- Chapter 3: WarDriving With Handheld Devices and Direction Finding
- Chapter 4: WarDriving and Penetration Testing with Windows
- Chapter 5: WarDriving and Penetration Testing with Linux
- Chapter 6: WarDriving and Wireless Penetration Testing with OS X
- Chapter 7: Wireless Penetration Testing Using a Bootable Linux Distribution
- Chapter 8: Mapping WarDrives
- Chapter 9: Using Man-in-the-Middle Attacks to Your Advantage
-
Chapter 10: Using Custom Firmware for Wireless Penetration Testing
- Choices for Modifying the Firmware on a Wireless Access Point
- Installing OpenWRT on a Linksys WRT54G
- Configuring and Understanding the OpenWRT Network Interfaces
- Installing and Managing Software Packages for OpenWRT
- Enumeration and Scanning from the WRT54G
- Installation and Configuration of a Kismet Drone
- Installing Aircrack to Crack a WEP Key
- Summary
- Solutions Fast Track
- Chapter 11: Wireless Video Testing
- Appendix A: Solutions Fast Track
- Appendix B: Device Driver Auditing
- Index
Product information
- Title: WarDriving and Wireless Penetration Testing
- Author(s):
- Release date: November 2006
- Publisher(s): Syngress
- ISBN: 9780080520773
You might also like
book
Wireless Hacking: Projects for Wi-Fi Enthusiasts
Sales of wireless LANs to home users and small businesses will soar this year, with products …
book
Ad Hoc Mobile Wireless Networks, 2nd Edition
Now in its second edition, this volume explains the concepts, mechanism, design, and performance of ad …
book
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
" Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle …
book
Wireless Security: Know It All
The Newnes Know It All Series takes the best of what our authors have written to …