|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn915143355 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150730s2015 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCO
|d TOH
|d EBLCP
|d UHL
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1164492303
|
020 |
|
|
|a 9780071827621
|
020 |
|
|
|a 0071827625
|
020 |
|
|
|z 9780071827638
|
035 |
|
|
|a (OCoLC)915143355
|z (OCoLC)1164492303
|
037 |
|
|
|a CL0500000623
|b Safari Books Online
|
050 |
|
4 |
|a TK5103.2
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Wright, Joshua,
|e author.
|
245 |
1 |
0 |
|a Hacking exposed wireless :
|b wireless security secrets & solutions /
|c Joshua Wright, Johnny Cache.
|
246 |
3 |
0 |
|a Wireless security secrets & solutions
|
246 |
3 |
0 |
|a Wireless security secrets and solutions
|
250 |
|
|
|a Third edition.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill Education,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Hacking Exposed Ser.
|
588 |
0 |
|
|a Print version record.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Hacking 802.11 Wireless Technology -- CASE STUDY: Twelve Volt Hero -- 1 Introduction to 802.11 Hacking -- 802.11 in a Nutshell -- The Basics -- Addressing in 802.11 Packets -- 802.11 Security Primer -- Discovery Basics -- Hardware and Drivers -- A Note on the Linux Kernel -- Chipsets and Linux Drivers -- Modern Chipsets and Drivers -- Cards -- Antennas -- Cellular Data Cards -- GPS -- Summary -- 2 Scanning and Enumerating 802.11 Networks -- Choosing an Operating System
|
505 |
8 |
|
|a Windows -- OS X -- Linux -- Windows Discovery Tools -- Vistumbler -- Windows Sniffing/Injection Tools -- NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer) -- AirPcap -- CommView for WiFi -- OS X Discovery Tools -- KisMAC -- Linux Discovery Tools -- airodump-ng -- Kismet -- Advanced Visualization Techniques (PPI) -- Visualizing PPI-Tagged Kismet Data -- PPI-Based Triangulation (Servo-Bot) -- Summary -- 3 Attacking 802.11 Wireless Networks -- Basic Types of Attacks -- Security Through Obscurity -- Defeating WEP -- WEP Key Recovery Attacks -- Putting It All Together with Wifite
|
505 |
8 |
|
|a Installing Wifite on a WiFi Pineapple -- Summary -- 4 Attacking WPA-Protected 802.11 Networks -- Obtaining the Four-Way Handshake -- Cracking with Cryptographic Acceleration -- Breaking Authentication: WPA Enterprise -- Obtaining the EAP Handshake -- EAP-MD5 -- EAP-GTC -- LEAP -- EAP-FAST -- EAP-TLS -- PEAP and EAP-TTLS -- Running a Malicious RADIUS Server -- Summary -- 5 Attacking 802.11 Wireless Clients -- browser_autopwn: A Poor Man's Exploit Server -- Using Metasploit browser_autopwn -- Getting Started with I-love-my-neighbors -- Creating the AP -- Assigning an IP Address
|
505 |
8 |
|
|a Setting Up the Routes -- Redirecting HTTP Traffic -- Serving HTTP Content with Squid -- Attacking Clients While Attached to an AP -- Associating to the Network -- ARP Spoofing -- Direct Client Injection Techniques -- Summary -- 6 Taking It All the Way: Bridging the Air-Gap from Windows 8 -- Preparing for the Attack -- Exploiting Hotspot Environments -- Controlling the Client -- Local Wireless Reconnaissance -- Remote Wireless Reconnaissance -- Windows Monitor Mode -- Microsoft NetMon -- Target Wireless Network Attack -- Summary -- Part II Bluetooth
|
505 |
8 |
|
|a CASE STUDY: You Can Still Hack What You Can't See -- 7 Bluetooth Classic Scanning and Reconnaissance -- Bluetooth Classic Technical Overview -- Device Discovery -- Protocol Overview -- Bluetooth Profiles -- Encryption and Authentication -- Preparing for an Attack -- Selecting a Bluetooth Classic Attack Device -- Reconnaissance -- Active Device Discovery -- Passive Device Discovery -- Hybrid Discovery -- Passive Traffic Analysis -- Service Enumeration -- Summary -- 8 Bluetooth Low Energy Scanning and Reconnaissance -- Bluetooth Low Energy Technical Overview -- Physical Layer Behavior
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Wireless communication systems
|x Security measures.
|
650 |
|
0 |
|a Wireless LANs
|x Security measures.
|
650 |
|
6 |
|a Transmission sans fil
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux locaux sans fil
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Wireless communication systems
|x Security measures
|2 fast
|
650 |
|
7 |
|a Wireless LANs
|x Security measures
|2 fast
|
700 |
1 |
|
|a Cache, Johnny,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Wright, Joshua.
|t Hacking exposed wireless.
|b Third edition.
|d New York : McGraw-Hill Education, [2015]
|z 0071827633
|w (OCoLC)904182480
|
830 |
|
0 |
|a Hacking Exposed Ser.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071827621/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6255290
|
994 |
|
|
|a 92
|b IZTAP
|