Imagen de Google Jackets
Vista normal Vista MARC

Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu.

Por: Colaborador(es): Tipo de material: TextoTextoEditor: New York ; Mexico City : McGraw-Hill, 2010Fecha de copyright: ©2010Edición: Second editionDescripción: xxv, 484 páginas : ilustraciones ; 24 cmTipo de contenido:
  • texto
Tipo de medio:
  • sin medio
Tipo de soporte:
  • volumen
ISBN:
  • 9780071666619 (alk. paper)
  • 0071666613 (alk. paper)
Otro título:
  • wireless security secrets & solutions [Parte del título]
  • wireless security secrets and solutions [Parte del título]
Tema(s): Clasificación LoC:
  • TK 5103.2 C33.2010
Recursos en línea: Resumen: "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
Valoración
    Valoración media: 0.0 (0 votos)

A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com.

Incluye referencias bibliográficas e índice.

"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]