Hacking exposed wireless : wireless security secrets & solutions /
Saved in:
Author / Creator: | Wright, Joshua, author. |
---|---|
Edition: | Third edition. |
Imprint: | New York : McGraw-Hill Education, [2015] ©2015 |
Description: | 1 online resource (1 volume) : illustrations |
Language: | English |
Series: | Hacking Exposed Ser. Hacking Exposed Ser. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/13639063 |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | 13639063 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 150730s2015 nyua o 001 0 eng d | ||
005 | 20241126144707.2 | ||
019 | |a 1164492303 | ||
020 | |a 9780071827621 | ||
020 | |a 0071827625 | ||
020 | |z 9780071827638 | ||
035 | 9 | |a (OCLCCM-CC)915143355 | |
035 | |a (OCoLC)915143355 |z (OCoLC)1164492303 | ||
037 | |a CL0500000623 |b Safari Books Online | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCO |d OCLCF |d OCLCO |d TOH |d EBLCP |d UHL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
049 | |a MAIN | ||
050 | 4 | |a TK5103.2 | |
100 | 1 | |a Wright, Joshua, |e author. |0 http://id.loc.gov/authorities/names/n2010045905 | |
245 | 1 | 0 | |a Hacking exposed wireless : |b wireless security secrets & solutions / |c Joshua Wright, Johnny Cache. |
246 | 3 | 0 | |a Wireless security secrets & solutions |
246 | 3 | 0 | |a Wireless security secrets and solutions |
250 | |a Third edition. | ||
264 | 1 | |a New York : |b McGraw-Hill Education, |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Hacking Exposed Ser. | |
588 | 0 | |a Print version record. | |
500 | |a Includes index. | ||
505 | 0 | |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Hacking 802.11 Wireless Technology -- CASE STUDY: Twelve Volt Hero -- 1 Introduction to 802.11 Hacking -- 802.11 in a Nutshell -- The Basics -- Addressing in 802.11 Packets -- 802.11 Security Primer -- Discovery Basics -- Hardware and Drivers -- A Note on the Linux Kernel -- Chipsets and Linux Drivers -- Modern Chipsets and Drivers -- Cards -- Antennas -- Cellular Data Cards -- GPS -- Summary -- 2 Scanning and Enumerating 802.11 Networks -- Choosing an Operating System | |
505 | 8 | |a Windows -- OS X -- Linux -- Windows Discovery Tools -- Vistumbler -- Windows Sniffing/Injection Tools -- NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer) -- AirPcap -- CommView for WiFi -- OS X Discovery Tools -- KisMAC -- Linux Discovery Tools -- airodump-ng -- Kismet -- Advanced Visualization Techniques (PPI) -- Visualizing PPI-Tagged Kismet Data -- PPI-Based Triangulation (Servo-Bot) -- Summary -- 3 Attacking 802.11 Wireless Networks -- Basic Types of Attacks -- Security Through Obscurity -- Defeating WEP -- WEP Key Recovery Attacks -- Putting It All Together with Wifite | |
505 | 8 | |a Installing Wifite on a WiFi Pineapple -- Summary -- 4 Attacking WPA-Protected 802.11 Networks -- Obtaining the Four-Way Handshake -- Cracking with Cryptographic Acceleration -- Breaking Authentication: WPA Enterprise -- Obtaining the EAP Handshake -- EAP-MD5 -- EAP-GTC -- LEAP -- EAP-FAST -- EAP-TLS -- PEAP and EAP-TTLS -- Running a Malicious RADIUS Server -- Summary -- 5 Attacking 802.11 Wireless Clients -- browser_autopwn: A Poor Man's Exploit Server -- Using Metasploit browser_autopwn -- Getting Started with I-love-my-neighbors -- Creating the AP -- Assigning an IP Address | |
505 | 8 | |a Setting Up the Routes -- Redirecting HTTP Traffic -- Serving HTTP Content with Squid -- Attacking Clients While Attached to an AP -- Associating to the Network -- ARP Spoofing -- Direct Client Injection Techniques -- Summary -- 6 Taking It All the Way: Bridging the Air-Gap from Windows 8 -- Preparing for the Attack -- Exploiting Hotspot Environments -- Controlling the Client -- Local Wireless Reconnaissance -- Remote Wireless Reconnaissance -- Windows Monitor Mode -- Microsoft NetMon -- Target Wireless Network Attack -- Summary -- Part II Bluetooth | |
505 | 8 | |a CASE STUDY: You Can Still Hack What You Can't See -- 7 Bluetooth Classic Scanning and Reconnaissance -- Bluetooth Classic Technical Overview -- Device Discovery -- Protocol Overview -- Bluetooth Profiles -- Encryption and Authentication -- Preparing for an Attack -- Selecting a Bluetooth Classic Attack Device -- Reconnaissance -- Active Device Discovery -- Passive Device Discovery -- Hybrid Discovery -- Passive Traffic Analysis -- Service Enumeration -- Summary -- 8 Bluetooth Low Energy Scanning and Reconnaissance -- Bluetooth Low Energy Technical Overview -- Physical Layer Behavior | |
650 | 0 | |a Wireless communication systems |x Security measures. | |
650 | 0 | |a Wireless LANs |x Security measures. | |
650 | 6 | |a Transmission sans fil |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux locaux sans fil |x Sécurité |x Mesures. | |
650 | 7 | |a Wireless communication systems |x Security measures |2 fast | |
650 | 7 | |a Wireless LANs |x Security measures |2 fast | |
700 | 1 | |a Cache, Johnny, |e author. |0 http://id.loc.gov/authorities/names/nr2007011800 | |
758 | |i has work: |a Hacking exposed wireless (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFwQdkkBVw7b79649DYrjd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Wright, Joshua. |t Hacking exposed wireless. |b Third edition. |d New York : McGraw-Hill Education, [2015] |z 0071827633 |w (OCoLC)904182480 |
830 | 0 | |a Hacking Exposed Ser. | |
856 | 4 | 0 | |u https://go.oreilly.com/uchicago/library/view/-/9780071827621/?ar |y O'Reilly |
929 | |a oclccm | ||
999 | f | f | |s 0d38885a-e466-41d2-b36c-8424e787e271 |i 416f9833-6601-4674-962f-b78b89b429e3 |
928 | |t Library of Congress classification |a TK5103.2 |l Online |c UC-FullText |u https://go.oreilly.com/uchicago/library/view/-/9780071827621/?ar |z O'Reilly |g ebooks |i 13782005 |