Cargando…

Hacking exposed wireless : wireless security secrets & solutions /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Wright, Joshua (Autor), Cache, Johnny (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2015]
Edición:Third edition.
Colección:Hacking Exposed Ser.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn915143355
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150730s2015 nyua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCO  |d OCLCF  |d OCLCO  |d TOH  |d EBLCP  |d UHL  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1164492303 
020 |a 9780071827621 
020 |a 0071827625 
020 |z 9780071827638 
035 |a (OCoLC)915143355  |z (OCoLC)1164492303 
037 |a CL0500000623  |b Safari Books Online 
050 4 |a TK5103.2 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Wright, Joshua,  |e author. 
245 1 0 |a Hacking exposed wireless :  |b wireless security secrets & solutions /  |c Joshua Wright, Johnny Cache. 
246 3 0 |a Wireless security secrets & solutions 
246 3 0 |a Wireless security secrets and solutions 
250 |a Third edition. 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Hacking Exposed Ser. 
588 0 |a Print version record. 
500 |a Includes index. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Hacking 802.11 Wireless Technology -- CASE STUDY: Twelve Volt Hero -- 1 Introduction to 802.11 Hacking -- 802.11 in a Nutshell -- The Basics -- Addressing in 802.11 Packets -- 802.11 Security Primer -- Discovery Basics -- Hardware and Drivers -- A Note on the Linux Kernel -- Chipsets and Linux Drivers -- Modern Chipsets and Drivers -- Cards -- Antennas -- Cellular Data Cards -- GPS -- Summary -- 2 Scanning and Enumerating 802.11 Networks -- Choosing an Operating System 
505 8 |a Windows -- OS X -- Linux -- Windows Discovery Tools -- Vistumbler -- Windows Sniffing/Injection Tools -- NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer) -- AirPcap -- CommView for WiFi -- OS X Discovery Tools -- KisMAC -- Linux Discovery Tools -- airodump-ng -- Kismet -- Advanced Visualization Techniques (PPI) -- Visualizing PPI-Tagged Kismet Data -- PPI-Based Triangulation (Servo-Bot) -- Summary -- 3 Attacking 802.11 Wireless Networks -- Basic Types of Attacks -- Security Through Obscurity -- Defeating WEP -- WEP Key Recovery Attacks -- Putting It All Together with Wifite 
505 8 |a Installing Wifite on a WiFi Pineapple -- Summary -- 4 Attacking WPA-Protected 802.11 Networks -- Obtaining the Four-Way Handshake -- Cracking with Cryptographic Acceleration -- Breaking Authentication: WPA Enterprise -- Obtaining the EAP Handshake -- EAP-MD5 -- EAP-GTC -- LEAP -- EAP-FAST -- EAP-TLS -- PEAP and EAP-TTLS -- Running a Malicious RADIUS Server -- Summary -- 5 Attacking 802.11 Wireless Clients -- browser_autopwn: A Poor Man's Exploit Server -- Using Metasploit browser_autopwn -- Getting Started with I-love-my-neighbors -- Creating the AP -- Assigning an IP Address 
505 8 |a Setting Up the Routes -- Redirecting HTTP Traffic -- Serving HTTP Content with Squid -- Attacking Clients While Attached to an AP -- Associating to the Network -- ARP Spoofing -- Direct Client Injection Techniques -- Summary -- 6 Taking It All the Way: Bridging the Air-Gap from Windows 8 -- Preparing for the Attack -- Exploiting Hotspot Environments -- Controlling the Client -- Local Wireless Reconnaissance -- Remote Wireless Reconnaissance -- Windows Monitor Mode -- Microsoft NetMon -- Target Wireless Network Attack -- Summary -- Part II Bluetooth 
505 8 |a CASE STUDY: You Can Still Hack What You Can't See -- 7 Bluetooth Classic Scanning and Reconnaissance -- Bluetooth Classic Technical Overview -- Device Discovery -- Protocol Overview -- Bluetooth Profiles -- Encryption and Authentication -- Preparing for an Attack -- Selecting a Bluetooth Classic Attack Device -- Reconnaissance -- Active Device Discovery -- Passive Device Discovery -- Hybrid Discovery -- Passive Traffic Analysis -- Service Enumeration -- Summary -- 8 Bluetooth Low Energy Scanning and Reconnaissance -- Bluetooth Low Energy Technical Overview -- Physical Layer Behavior 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Wireless communication systems  |x Security measures. 
650 0 |a Wireless LANs  |x Security measures. 
650 6 |a Transmission sans fil  |x Sécurité  |x Mesures. 
650 6 |a Réseaux locaux sans fil  |x Sécurité  |x Mesures. 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
650 7 |a Wireless LANs  |x Security measures  |2 fast 
700 1 |a Cache, Johnny,  |e author. 
776 0 8 |i Print version:  |a Wright, Joshua.  |t Hacking exposed wireless.  |b Third edition.  |d New York : McGraw-Hill Education, [2015]  |z 0071827633  |w (OCoLC)904182480 
830 0 |a Hacking Exposed Ser. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071827621/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6255290 
994 |a 92  |b IZTAP