Hurley / Rogers / Thornton | WarDriving and Wireless Penetration Testing | E-Book | www.sack.de
E-Book

E-Book, Englisch, 446 Seiten

Hurley / Rogers / Thornton WarDriving and Wireless Penetration Testing


1. Auflage 2006
ISBN: 978-0-08-052077-3
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark

E-Book, Englisch, 446 Seiten

ISBN: 978-0-08-052077-3
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark



Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.

* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.

* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.

* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.

Hurley / Rogers / Thornton WarDriving and Wireless Penetration Testing jetzt bestellen!

Zielgruppe


Academic/professional/technical: Research and professional

Weitere Infos & Material


1;Front Cover;1
2;War Driving & Wireless: Penetration Testing;4
3;Copyright Page;5
4;Contents;14
5;Chapter 1. Introduction to WarDriving and Penetration Testing;32
5.1;Introduction;33
5.2;WarDriving;33
5.3;The Origins of WarDriving;34
5.4;Tools of the Trade or "What Do I Need?";36
5.5;Putting It All Together;45
5.6;Penetration Testing;51
5.7;Tools for Penetration Testing;56
5.8;Conclusion and What to Expect From this Book;57
5.9;Solutions Fast Track;58
5.10;Frequently Asked Questions;60
6;Chapter 2. Understanding Antennas and Antenna Theory;62
6.1;Introduction;63
6.2;Terminology and Jargon;66
6.3;Differences Between Antenna Types;74
6.4;Other RF Devices;84
6.5;Summary;90
6.6;Solutions Fast Track;90
6.7;Frequently Asked Questions;91
7;Chapter 3. WarDriving with Handheld Devices and Direction Finding;94
7.1;Introduction;95
7.2;WarDriving with a Sharp Zaurus;95
7.3;WarDriving with MiniStumbler;110
7.4;Direction Finding with a Handheld Device;118
7.5;Summary;121
7.6;Solutions Fast Track;122
7.7;Frequently Asked Questions;123
8;Chapter 4. WarDriving and Penetration Testing with Windows;124
8.1;Introduction;125
8.2;WarDriving with NetStumbler;125
8.3;Running NetStumbler;130
8.4;Wireless Penetration Testing with Windows;139
8.5;Summary;146
8.6;Solutions Fast Track;147
8.7;Frequently Asked Questions;147
9;Chapter 5. WarDriving and Penetration Testing with Linux;150
9.1;Introduction;151
9.2;Preparing Your System to WarDrive;151
9.3;WarDriving with Linux and Kismet;162
9.4;Wireless Penetration Testing Using Linux;169
9.5;Summary;181
9.6;Solutions Fast Track;182
9.7;Frequently Asked Questions;183
10;Chapter 6. WarDriving and Wireless Penetration Testing with OS X;184
10.1;Introduction;185
10.2;WarDriving with KisMAC;185
10.3;Mapping WarDrives with KisMAC;193
10.4;WarDriving with KisMAC;197
10.5;Penetration Testing with OS X;201
10.6;Other OS X Tools for WarDriving and WLAN Testing;207
10.7;Summary;209
10.8;Solutions Fast Track;209
10.9;Frequently Asked Questions;211
11;Chapter 7. Wireless Penetration Testing Using a Bootable Linux Distribution;214
11.1;Introduction;215
11.2;Core Technologies;216
11.3;Open Source Tools;224
11.4;Case Study;239
11.5;Further Information;245
11.6;Solutions Fast Track;246
11.7;Frequently Asked Questions;248
12;Chapter 8. Mapping WarDrives;250
12.1;Introduction;251
12.2;Using the Global Positioning System Daemon with Kismet;251
12.3;Configuring Kismet for Mapping;257
12.4;Mapping WarDrives with GPSMAP;258
12.5;Mapping WarDrives with StumbVerter;262
12.6;Summary;275
12.7;Solutions Fast Track;276
12.8;Frequently Asked Questions;277
13;Chapter 9. Using Man-in-the-Middle Attacks to Your Advantage;278
13.1;Introduction;279
13.2;Hardware for the Attack—Antennas, Amps, WiFi Cards;281
13.3;Identify and Compromise the Target Access Point;286
13.4;The MITM Attack Laptop Configuration;288
13.5;Clone the Target Access Point and Begin the Attack;300
13.6;Summary;309
13.7;Solutions Fast Track;309
13.8;Frequently Asked Questions;312
14;Chapter 10. Using Custom Firmware for Wireless Penetration Testing;314
14.1;Choices for Modifying the Firmware on a Wireless Access Point;315
14.2;Installing OpenWRT on a Linksys WRT54G;316
14.3;Configuring and Understanding the OpenWKT Network Interfaces;327
14.4;Installing and Managing Software Packages for OpenWRT;329
14.5;Enumeration and Scanning from the WKT54G;333
14.6;Installation and Configuration of a Kismet Drone;337
14.7;Installing Aircrack to Crack a WEP Key;341
14.8;Summary;345
14.9;Solutions Fast Track;346
14.10;Frequently Asked Questions;349
15;Chapter 11. Wireless Video Testing;350
15.1;Introduction;351
15.2;Wireless Video Technologies;352
15.3;Tools for Detection;358
15.4;Summary;370
15.5;Solutions Fast Track;370
15.6;Frequently Asked Questions;372
16;Appendix A. Solutions Fast Track;374
17;Appendix B. Device Driver Auditing;392
17.1;Introduction;393
17.2;Why Should You Care;394
17.3;What is a Device Driver?;397
17.4;Summary;414
18;Index;416
19;Syngress: The Definition of a Serious Security Library;432



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.