Hacking exposed wireless : wireless security secrets & solutions /

Saved in:
Bibliographic Details
Author / Creator:Wright, Joshua, author.
Edition:Third edition.
Imprint:New York : McGraw-Hill Education, [2015]
©2015
Description:1 online resource (1 volume) : illustrations
Language:English
Series:Hacking Exposed Ser.
Hacking Exposed Ser.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13639063
Hidden Bibliographic Details
Varying Form of Title:Wireless security secrets & solutions
Wireless security secrets and solutions
Other authors / contributors:Cache, Johnny, author.
ISBN:9780071827621
0071827625
9780071827638
Notes:Includes index.
Print version record.
Other form:Print version: Wright, Joshua. Hacking exposed wireless. Third edition. New York : McGraw-Hill Education, [2015] 0071827633

MARC

LEADER 00000cam a2200000 i 4500
001 13639063
006 m o d
007 cr unu||||||||
008 150730s2015 nyua o 001 0 eng d
005 20241126144707.2
019 |a 1164492303 
020 |a 9780071827621 
020 |a 0071827625 
020 |z 9780071827638 
035 9 |a (OCLCCM-CC)915143355 
035 |a (OCoLC)915143355  |z (OCoLC)1164492303 
037 |a CL0500000623  |b Safari Books Online 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCO  |d OCLCF  |d OCLCO  |d TOH  |d EBLCP  |d UHL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a MAIN 
050 4 |a TK5103.2 
100 1 |a Wright, Joshua,  |e author.  |0 http://id.loc.gov/authorities/names/n2010045905 
245 1 0 |a Hacking exposed wireless :  |b wireless security secrets & solutions /  |c Joshua Wright, Johnny Cache. 
246 3 0 |a Wireless security secrets & solutions 
246 3 0 |a Wireless security secrets and solutions 
250 |a Third edition. 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Hacking Exposed Ser. 
588 0 |a Print version record. 
500 |a Includes index. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Hacking 802.11 Wireless Technology -- CASE STUDY: Twelve Volt Hero -- 1 Introduction to 802.11 Hacking -- 802.11 in a Nutshell -- The Basics -- Addressing in 802.11 Packets -- 802.11 Security Primer -- Discovery Basics -- Hardware and Drivers -- A Note on the Linux Kernel -- Chipsets and Linux Drivers -- Modern Chipsets and Drivers -- Cards -- Antennas -- Cellular Data Cards -- GPS -- Summary -- 2 Scanning and Enumerating 802.11 Networks -- Choosing an Operating System 
505 8 |a Windows -- OS X -- Linux -- Windows Discovery Tools -- Vistumbler -- Windows Sniffing/Injection Tools -- NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer) -- AirPcap -- CommView for WiFi -- OS X Discovery Tools -- KisMAC -- Linux Discovery Tools -- airodump-ng -- Kismet -- Advanced Visualization Techniques (PPI) -- Visualizing PPI-Tagged Kismet Data -- PPI-Based Triangulation (Servo-Bot) -- Summary -- 3 Attacking 802.11 Wireless Networks -- Basic Types of Attacks -- Security Through Obscurity -- Defeating WEP -- WEP Key Recovery Attacks -- Putting It All Together with Wifite 
505 8 |a Installing Wifite on a WiFi Pineapple -- Summary -- 4 Attacking WPA-Protected 802.11 Networks -- Obtaining the Four-Way Handshake -- Cracking with Cryptographic Acceleration -- Breaking Authentication: WPA Enterprise -- Obtaining the EAP Handshake -- EAP-MD5 -- EAP-GTC -- LEAP -- EAP-FAST -- EAP-TLS -- PEAP and EAP-TTLS -- Running a Malicious RADIUS Server -- Summary -- 5 Attacking 802.11 Wireless Clients -- browser_autopwn: A Poor Man's Exploit Server -- Using Metasploit browser_autopwn -- Getting Started with I-love-my-neighbors -- Creating the AP -- Assigning an IP Address 
505 8 |a Setting Up the Routes -- Redirecting HTTP Traffic -- Serving HTTP Content with Squid -- Attacking Clients While Attached to an AP -- Associating to the Network -- ARP Spoofing -- Direct Client Injection Techniques -- Summary -- 6 Taking It All the Way: Bridging the Air-Gap from Windows 8 -- Preparing for the Attack -- Exploiting Hotspot Environments -- Controlling the Client -- Local Wireless Reconnaissance -- Remote Wireless Reconnaissance -- Windows Monitor Mode -- Microsoft NetMon -- Target Wireless Network Attack -- Summary -- Part II Bluetooth 
505 8 |a CASE STUDY: You Can Still Hack What You Can't See -- 7 Bluetooth Classic Scanning and Reconnaissance -- Bluetooth Classic Technical Overview -- Device Discovery -- Protocol Overview -- Bluetooth Profiles -- Encryption and Authentication -- Preparing for an Attack -- Selecting a Bluetooth Classic Attack Device -- Reconnaissance -- Active Device Discovery -- Passive Device Discovery -- Hybrid Discovery -- Passive Traffic Analysis -- Service Enumeration -- Summary -- 8 Bluetooth Low Energy Scanning and Reconnaissance -- Bluetooth Low Energy Technical Overview -- Physical Layer Behavior 
650 0 |a Wireless communication systems  |x Security measures. 
650 0 |a Wireless LANs  |x Security measures. 
650 6 |a Transmission sans fil  |x Sécurité  |x Mesures. 
650 6 |a Réseaux locaux sans fil  |x Sécurité  |x Mesures. 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
650 7 |a Wireless LANs  |x Security measures  |2 fast 
700 1 |a Cache, Johnny,  |e author.  |0 http://id.loc.gov/authorities/names/nr2007011800 
758 |i has work:  |a Hacking exposed wireless (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFwQdkkBVw7b79649DYrjd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Wright, Joshua.  |t Hacking exposed wireless.  |b Third edition.  |d New York : McGraw-Hill Education, [2015]  |z 0071827633  |w (OCoLC)904182480 
830 0 |a Hacking Exposed Ser. 
856 4 0 |u https://go.oreilly.com/uchicago/library/view/-/9780071827621/?ar  |y O'Reilly 
929 |a oclccm 
999 f f |s 0d38885a-e466-41d2-b36c-8424e787e271  |i 416f9833-6601-4674-962f-b78b89b429e3 
928 |t Library of Congress classification  |a TK5103.2  |l Online  |c UC-FullText  |u https://go.oreilly.com/uchicago/library/view/-/9780071827621/?ar  |z O'Reilly  |g ebooks  |i 13782005