Limit search to available items
Book Cover
Book
Author Cache, Johnny.

Title Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu
Edition Second edition
Published New York : McGraw-Hill, [2010]
©2010

Copies

Location Call no. Vol. Availability
 MELB  005.8 Cac/Hew 2010  AVAILABLE
Description xxv, 484 pages : illustrations ; 24 cm
Series Hacking exposed
Contents Machine generated contents note: pt. I Hacking 802.11 Wireless Technology -- Case Study: Wireless Hacking for Hire -- Her First Engagement -- A Parking Lot Approach -- The Robot Invasion -- Final Wrap-Up -- 1.Introduction to 802.11 Hacking -- 802.11.In a Nutshell -- The Basics -- Addressing in 802.11 Packets -- 802.11 Security Primer -- Discovery Basics -- Hardware and Drivers -- A Note on the Linux Kernel -- Chipsets and Linux Drivers -- Modern Chipsets and Drivers -- Cards -- Antennas -- Cellular Data Cards -- GPS -- Summary -- 2.Scanning and Enumerating 802.11 Networks -- Choosing an Operating System -- Windows -- OS X -- Linux -- Windows Discovery Tools -- Vistumbler -- inSSIDer -- Windows Sniffing/Injection Tools -- NDIS 6.0 Monitor Mode Support (NetMon) -- AirPcap -- CommView for WiFi -- OS X Discovery Tools -- KisMAC -- Kismet on OS X -- Linux Discovery Tools -- Kismet -- Mobile Discovery Tools -- Online Mapping Services (WIGLE and Skyhook) -- Summary --
Contents note continued: 3.Attacking 802.11 Wireless Networks -- Basic Types of Attacks -- Security Through Obscurity -- Defeating WEP -- WEP Key Recovery Attacks -- Bringing It All Together: Cracking a Hidden Mac-Filtering WEP-Encrypted Network -- Keystream Recovery Attacks Against WEP -- Attacking the Availability of Wireless Networks -- Summary -- 4.Attacking WPA-Protected 802.11 Networks -- Breaking Authentication: WPA-PSK -- Breaking Authentication: WPA Enterprise -- Obtaining the EAP Handshake -- LEAP -- PEAP and EAP-TTLS -- EAP-TLS -- EAP-FAST -- EAP-MD5 -- Breaking Encryption: TKIP -- Attacking Components -- Summary -- pt. II Hacking 802.11 Clients -- Case Study: Riding the Insecure Airwaves -- 5.Attack 802.11 Wireless Clients -- Attacking the Application Layer -- Attacking Clients Using an Evil DNS Server -- Ettercap Support for Content Modification -- Dynamically Generating Rogue APs and Evil Servers with Karmetasploit -- Direct Client Injection Techniques --
Contents note continued: Injecting Data Packets with AirPWN -- Generic Client-side Injection with airtun-ng -- Munging Software Updates with IPPON -- Device Driver Vulnerabilities -- Fingerprinting Device Drivers -- Web Hacking and Wi-Fi -- Hacking DNS via XSRF Attacks Against Routers -- Summary -- 6.Taking It All The Way: Bridging the Airgap from OS X -- The Game Plan -- Preparing the Exploit -- Prepping the Callback -- Performing Initial Reconnaissance -- Preparing Kismet, Aircrack-ng -- Prepping the Package -- Exploiting WordPress to Deliver the Java Exploit -- Making the Most of User-level Code Execution -- Gathering 802.11 Intel (User-level Access) -- Popping Root by Brute-forcing the Keychain -- Returning Victorious to the Machine -- Managing OS X's Firewall -- Summary -- 7.Taking It All the Way: Bridging the Airgap from Windows -- The Attack Scenario -- Preparing for the Attack -- Exploiting Hotspot Environments -- Controlling the Client -- Local Wireless Reconnaissance --
Contents note continued: Remote Wireless Reconnaissance -- Windows Monitor Mode -- Microsoft NetMon -- Target Wireless Network Attack -- Summary -- pt. III Hacking Additional Wireless Technologies -- Case Study: Snow Day -- 8.Bluetooth Scanning and Reconnaissance -- Bluetooth Technical Overview -- Device Discovery -- Protocol Overview -- Bluetooth Profiles -- Encryption and Authentication -- Preparing for an Attack -- Selecting a Bluetooth Attack Device -- Reconnaissance -- Active Device Discovery -- Passive Device Discovery -- Hybrid Discovery -- Passive Traffic Analysis -- Service Enumeration -- Summary -- 9.Bluetooth Eavesdropping -- Commercial Bluetooth Sniffing -- Open-Source Bluetooth Sniffing -- Summary -- 10.Attacking and Exploiting Bluetooth -- PIN Attacks -- Practical PIN Cracking -- Identity Manipulation -- Bluetooth Service and Device Class -- Bluetooth Device Name -- Abusing Bluetooth Profiles -- Testing Connection Access -- Unauthorized AT Access --
Contents note continued: Unauthorized PAN Access -- Headset Profile Attacks -- File Transfer Attacks -- Future Outlook -- Summary -- 11.Hack ZigBee -- ZigBee Introduction -- ZigBee's Place as a Wireless Standard -- ZigBee Deployments -- ZigBee History and Evolution -- ZigBee Layers -- ZigBee Profiles -- ZigBee Security -- Rules in the Design of ZigBee Security -- ZigBee Encryption -- ZigBee Authenticity -- ZigBee Authentication -- ZigBee Attacks -- Introduction to KillerBee -- Network Discovery -- Eavesdropping Attacks -- Replay Attacks -- Encryption Attacks -- Attack Walkthrough -- Network Discovery and Location -- Analyzing the ZigBee Hardware -- RAM Data Analysis -- Summary -- 12.Hack DECT -- DECT Introduction -- DECT Profiles -- DECT PHY Layer -- DECT MAC Layer -- Base Station Selection -- DECT Security -- Authentication and Pairing -- Encryption Services -- DECT Attacks -- DECT Hardware -- DECT Eavesdropping -- DECT Audio Recording -- Summary --
Contents note continued: A.Scoping and Information Gathering -- Pre-assessment -- Scoping -- Things to Bring to a Wireless Assessment -- Conducting Scoping Interviews -- Gathering Information via Satellite Imagery -- Putting It All Together
Summary "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
Notes Includes bibliographical references and index
Bibliography Includes bibliographical references and index
Subject Wireless communication systems -- Security measures.
Wireless LANs -- Security measures.
Author Liu, Vincent.
Wright, Joshua.
LC no. 2010027293
ISBN 0071666613 alkaline paper
9780071666619 alkaline paper