- Shopping Bag ( 0 items )
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
• According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.
• The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.
• Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
"WarDriving and Wireless Penetration Testing" brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.
1. Introduction to WarDriving and Penetration Testing
2. Understanding Antenna Theory
3. WarDriving with Handheld Devices and Direction Finding
4. Performing Penetration Testing on Wireless Networks using Linux
5. Performing Penetration Testing on Wireless Networks using OS X
6. Performing Penetration Testing on Wireless Networks using a Bootable CD Distribution
7. Mapping WarDrives
8. Using Man in the Middle Attacks to Your Advantage
9. Using Custom Firmware
Posted April 9, 2007
Are you a wireless security administrator? If you are, then this book is for you. Authors Chris Hurley, Russ Rogers, Frank Thornton, Daniel Connelly and Brian Baker, have done an outstanding job of writing a book to show you how to analyze wireless networks through wardriving and penetration testing. Hurley, Rogers, Thornton, Connelly and Baker, begin with a discussion about wardriving and how it applies to a wireless penetration test. Then, the authors discuss how antennas work and how to choose the right antenna for conduction wireless network penetration testing. Next, they show you how to use a handheld device for direction finding and tracking, down to rogue access points and clients. The authors also introduce some basic techniques for wardriving and penetration testing using Microsoft Windows. They continue by describing the steps necessary to configure and utilize the KisMAC WLAN discovery tool in order to successfully wardrive. Then, the authors show you how to identify your specific WLAN target and determine what security measures are being utilized. Next, they show you how to use two of the most popular mapping applications: Kismet and NetStumbler. The authors then discuss the hardware required for a wireless MITM attack. They continue by focusing on the Open WRT firmware. Finally, they focus on how to perform a wireless test against a client, and examine some of the vulnerabilities related to wireless video. This most excellent book assesses wireless networks, while leveraging these free tools to low-cost supporting hardware. Perhaps more importantly, after reading this book, you¿ll get a taste of how wardriving really works in the real world.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.