WarDriving and Wireless Penetration Testing

ยท ยท ยท
ยท Elsevier
3.7
แž€แžถแžšแžœแžถแž™แžแž˜แŸ’แž›แŸƒ 7
แžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž…
446
แž‘แŸ†แž–แŸแžš
แž˜แžถแž“แžŸแžทแž‘แŸ’แž’แžท
แž€แžถแžšแžœแžถแž™แžแž˜แŸ’แž›แŸƒ แž“แžทแž„แž˜แžแžทแžœแžถแž™แžแž˜แŸ’แž›แŸƒแž˜แžทแž“แžแŸ’แžšแžผแžœแž”แžถแž“แž•แŸ’แž‘แŸ€แž„แž•แŸ’แž‘แžถแžแŸ‹แž‘แŸ แžŸแŸ’แžœแŸ‚แž„แž™แž›แŸ‹แž”แž“แŸ’แžแŸ‚แž˜

แžขแŸ†แž–แžธแžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แž“แŸแŸ‡

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008. * The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers. * Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.

แž€แžถแžšแžŠแžถแž€แŸ‹แž•แŸ’แž€แžถแž™ แž“แžทแž„แž˜แžแžทแžœแžถแž™แžแž˜แŸ’แž›แŸƒ

3.7
แž€แžถแžšแžœแžถแž™แžแž˜แŸ’แž›แŸƒ 7

แžขแŸ†แž–แžธโ€‹แžขแŸ’แž“แž€แž“แžทแž–แž“แŸ’แž’

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, Sรฃo Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2ยฎ (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."

แžœแžถแž™แžแž˜แŸ’แž›แŸƒแžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แž“แŸแŸ‡

แž”แŸ’แžšแžถแž”แŸ‹แž™แžพแž„แžขแŸ†แž–แžธแž€แžถแžšแž™แž›แŸ‹แžƒแžพแž‰แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ”

แžขแžถแž“โ€‹แž–แŸแžแŸŒแž˜แžถแž“

แž‘แžผแžšแžŸแž–แŸ’แž‘แž†แŸ’แž›แžถแžแžœแŸƒ แž“แžทแž„โ€‹แžแŸแž”แŸ’แž›แŸแž
แžŠแŸ†แžกแžพแž„แž€แž˜แŸ’แž˜แžœแžทแž’แžธ Google Play Books แžŸแž˜แŸ’แžšแžถแž”แŸ‹ Android แž“แžทแž„ iPad/iPhone แŸ” แžœแžถโ€‹แž’แŸ’แžœแžพแžŸแž˜แž€แžถแž›แž€แž˜แŸ’แž˜โ€‹แžŠแŸ„แž™แžŸแŸ’แžœแŸแž™แž”แŸ’แžšแžœแžแŸ’แžแžทแž‡แžถแž˜แžฝแž™โ€‹แž‚แžŽแž“แžธโ€‹แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€โ€‹ แž“แžทแž„โ€‹แžขแž“แžปแž‰แŸ’แž‰แžถแžแžฑแŸ’แž™โ€‹แžขแŸ’แž“แž€แžขแžถแž“แž–แŸแž›โ€‹แž˜แžถแž“แžขแŸŠแžธแž“แž’แžบแžŽแžทแž แžฌแž‚แŸ’แž˜แžถแž“โ€‹แžขแŸŠแžธแž“แž’แžบแžŽแžทแžโ€‹แž“แŸ…แž‚แŸ’แžšแž”แŸ‹แž‘แžธแž€แž“แŸ’แž›แŸ‚แž„แŸ”
แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžšโ€‹แž™แžฝแžšแžŠแŸƒ แž“แžทแž„แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžš
แžขแŸ’แž“แž€แžขแžถแž…แžŸแŸ’แžŠแžถแž”แŸ‹แžŸแŸ€แžœแž—แŸ…แž‡แžถแžŸแŸ†แžกแŸแž„แžŠแŸ‚แž›แž”แžถแž“แž‘แžทแž‰แž“แŸ…แž€แŸ’แž“แžปแž„ Google Play แžŠแŸ„แž™แž”แŸ’แžšแžพแž€แž˜แŸ’แž˜แžœแžทแž’แžธแžšแžปแž€แžšแž€แžแžถแž˜แžขแŸŠแžธแž“แž’แžบแžŽแžทแžแž€แŸ’แž“แžปแž„แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ”
eReaders แž“แžทแž„โ€‹แžงแž”แž€แžšแžŽแŸโ€‹แž•แŸ’แžŸแŸแž„โ€‹แž‘แŸ€แž
แžŠแžพแž˜แŸ’แž”แžธแžขแžถแž“แž“แŸ…แž›แžพโ€‹แžงแž”แž€แžšแžŽแŸ e-ink แžŠแžผแž…แž‡แžถโ€‹แžงแž”แž€แžšแžŽแŸแžขแžถแž“โ€‹แžŸแŸ€แžœแž—แŸ…แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€ Kobo แžขแŸ’แž“แž€แž“แžนแž„แžแŸ’แžšแžผแžœโ€‹แž‘แžถแž‰แž™แž€โ€‹แžฏแž€แžŸแžถแžš แž แžพแž™โ€‹แž•แŸ’แž‘แŸแžšแžœแžถแž‘แŸ…โ€‹แžงแž”แž€แžšแžŽแŸโ€‹แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ” แžŸแžผแž˜แžขแž“แžปแžœแžแŸ’แžแžแžถแž˜โ€‹แž€แžถแžšแžŽแŸ‚แž“แžถแŸ†แž›แž˜แŸ’แžขแžทแžแžšแž”แžŸแŸ‹แž˜แž‡แŸ’แžˆแž˜แžŽแŸ’แžŒแž›แž‡แŸ†แž“แžฝแž™ แžŠแžพแž˜แŸ’แž”แžธแž•แŸ’แž‘แŸแžšแžฏแž€แžŸแžถแžšโ€‹แž‘แŸ…แžงแž”แž€แžšแžŽแŸแžขแžถแž“แžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แžŠแŸ‚แž›แžŸแŸ’แž‚แžถแž›แŸ‹แŸ”