Hacking exposed wireless : wireless security secrets & solutions /

Saved in:
Bibliographic Details
Author / Creator:Wright, Joshua, author.
Edition:Third edition.
Imprint:New York : McGraw-Hill Education, [2015]
©2015
Description:1 online resource (1 volume) : illustrations
Language:English
Series:Hacking Exposed Ser.
Hacking Exposed Ser.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13639063
Hidden Bibliographic Details
Varying Form of Title:Wireless security secrets & solutions
Wireless security secrets and solutions
Other authors / contributors:Cache, Johnny, author.
ISBN:9780071827621
0071827625
9780071827638
Notes:Includes index.
Print version record.
Other form:Print version: Wright, Joshua. Hacking exposed wireless. Third edition. New York : McGraw-Hill Education, [2015] 0071827633
Table of Contents:
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Foreword
  • Acknowledgments
  • Introduction
  • Part I Hacking 802.11 Wireless Technology
  • CASE STUDY: Twelve Volt Hero
  • 1 Introduction to 802.11 Hacking
  • 802.11 in a Nutshell
  • The Basics
  • Addressing in 802.11 Packets
  • 802.11 Security Primer
  • Discovery Basics
  • Hardware and Drivers
  • A Note on the Linux Kernel
  • Chipsets and Linux Drivers
  • Modern Chipsets and Drivers
  • Cards
  • Antennas
  • Cellular Data Cards
  • GPS
  • Summary
  • 2 Scanning and Enumerating 802.11 Networks
  • Choosing an Operating System
  • Windows
  • OS X
  • Linux
  • Windows Discovery Tools
  • Vistumbler
  • Windows Sniffing/Injection Tools
  • NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer)
  • AirPcap
  • CommView for WiFi
  • OS X Discovery Tools
  • KisMAC
  • Linux Discovery Tools
  • airodump-ng
  • Kismet
  • Advanced Visualization Techniques (PPI)
  • Visualizing PPI-Tagged Kismet Data
  • PPI-Based Triangulation (Servo-Bot)
  • Summary
  • 3 Attacking 802.11 Wireless Networks
  • Basic Types of Attacks
  • Security Through Obscurity
  • Defeating WEP
  • WEP Key Recovery Attacks
  • Putting It All Together with Wifite
  • Installing Wifite on a WiFi Pineapple
  • Summary
  • 4 Attacking WPA-Protected 802.11 Networks
  • Obtaining the Four-Way Handshake
  • Cracking with Cryptographic Acceleration
  • Breaking Authentication: WPA Enterprise
  • Obtaining the EAP Handshake
  • EAP-MD5
  • EAP-GTC
  • LEAP
  • EAP-FAST
  • EAP-TLS
  • PEAP and EAP-TTLS
  • Running a Malicious RADIUS Server
  • Summary
  • 5 Attacking 802.11 Wireless Clients
  • browser_autopwn: A Poor Man's Exploit Server
  • Using Metasploit browser_autopwn
  • Getting Started with I-love-my-neighbors
  • Creating the AP
  • Assigning an IP Address
  • Setting Up the Routes
  • Redirecting HTTP Traffic
  • Serving HTTP Content with Squid
  • Attacking Clients While Attached to an AP
  • Associating to the Network
  • ARP Spoofing
  • Direct Client Injection Techniques
  • Summary
  • 6 Taking It All the Way: Bridging the Air-Gap from Windows 8
  • Preparing for the Attack
  • Exploiting Hotspot Environments
  • Controlling the Client
  • Local Wireless Reconnaissance
  • Remote Wireless Reconnaissance
  • Windows Monitor Mode
  • Microsoft NetMon
  • Target Wireless Network Attack
  • Summary
  • Part II Bluetooth
  • CASE STUDY: You Can Still Hack What You Can't See
  • 7 Bluetooth Classic Scanning and Reconnaissance
  • Bluetooth Classic Technical Overview
  • Device Discovery
  • Protocol Overview
  • Bluetooth Profiles
  • Encryption and Authentication
  • Preparing for an Attack
  • Selecting a Bluetooth Classic Attack Device
  • Reconnaissance
  • Active Device Discovery
  • Passive Device Discovery
  • Hybrid Discovery
  • Passive Traffic Analysis
  • Service Enumeration
  • Summary
  • 8 Bluetooth Low Energy Scanning and Reconnaissance
  • Bluetooth Low Energy Technical Overview
  • Physical Layer Behavior