Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide.
Table of Contents
Part I: Hack 802.11 Wireless Technology
1- Introduction to 802.11 Hacking
2- Scanning and Enumerating 802.11 Networks
3- Attacking 802.11 Wireless Networks
4- Attacking WPA-protected 802.11 Networks
Part II: Hack 802.11 Clients
5- Attack 802.11 Wireless Clients
6- Taking it All the Way: Bridging the Airgap from OS X
7- Taking it All the Way: Bridge the Airgap from Windows
Part III: Hack Additional Wireless Technologies
8- Bluetooth Scanning and Reconnaissance
9- Bluetooth Eavesdropping
10- Attacking and Exploiting Bluetooth
11- Hack Zigbee
12- Hack DECT
You can download this book from any of the following links. If any link is dead please feel free to leave a comment.
Download here (BOOK)
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.