技术细节
分类 |
Networking software |
发行人 |
McGraw-Hill |
页数 |
512 |
作者 |
Johnny Cache Joshua Wright Vincent Liu |
The latest techniques for securing wireless networks using the proven Hacking Exposed methodology
Filled with detailed instructions for attacking wireless technology, Hacking Exposed Wireless, Second Edition shows you how attackers break into wireless systems step-by-step, leveraging weaknesses in WPA2, enterprise authentication, client deficiencies and more. In this fully revised book, the authors? debut advanced wireless attack techniques including Bridging the Airgap exploits with straightforward explanations and practical implementation techniques.
For the first time in print, comprehensive coverage on attacking non-WiFi networks is also included, helping organizations recognize threats beyond wireless LAN networks. Covering Bluetooth, DECT and ZigBee exploits, the authors take you through the process of understanding the qualities and benefits of the technology, starting with simple and advancing to complex attacks.
For each attack, the authors? help you view the wireless technology from the eyes of an attacker, demonstrating how widely deployed and critical wireless technology can be manipulated. After fully engrossing the reader in the ability to hack a given wireless technology, they help you understand what can be done to defend against the attack as well through additional defenses, workarounds, detection and mitigation techniques.
Hacking Exposed Wireless, Second Edition features:
- Comprehensive coverage for attacking and defending 802.11, Bluetooth, ZigBee and DECT networks
- Content written by the same wireless security experts who have written and published many of the wireless attack tools used today
- Detailed attack walkthroughs for emerging and advanced techniques leveraged by attackers to gain a foothold into modern networks
- Patches, workarounds and recommendations for effectively leveraging open-source wireless exploit tools
- Global examples throughout
Comprehensive coverage of wireless network security:
802.11 in a Nutshell, WLAN Discovery Techniques, 802.11 Hardware Solutions, Building an Attack Platform on Windows, Linux, OS X, Mobile Discovery Tools, Online Mapping Services, Defeating WLAN Obscurity, Cracking WEP, Breaking WPA2-PSK, Breaking Enterprise WPA, Exploiting EAP Authentication Methods, Breaking WLAN Encryption, Exploiting DNS over Wireless, WLAN Man-in-the-Middle Attacks, Dynamic Attacks with Karmetasploit, Manipulating Client Drivers, Exploiting Client Software Updates, Web Hacking and WiFi, Leveraging Compromised OS X Clients, Leveraging Compromised Windows Clients, Bluetooth Scanning and Reconnaissance, Bluetooth Device Enumeration, Active and Passive Bluetooth Device Discovery, Sniffing Bluetooth Networks, Leveraging Software Defined Radio for Wireless Attacks, Exploiting Bluetooth PINs, Manipulating Bluetooth Identities, Abusing Bluetooth Profiles, Introduction to ZigBee, ZigBee's Security Model, Exploiting ZigBee with KillerBee, ZigBee Hardware Exploits, DECT Cordless Phone Introduction, Exploiting DECT Pairing and Authentication, DECT Audio Eavesdropping Attacks, Effectively Scoping a Wireless Security Engagement.