WarDriving and Wireless Penetration Testing

個数:1
紙書籍版価格
¥11,336
  • 電子書籍
  • ポイントキャンペーン

WarDriving and Wireless Penetration Testing

  • 著者名:Hurley, Chris/Rogers, Russ/Thornton, Frank/Baker, Brian
  • 価格 ¥7,509 (本体¥6,827)
  • Syngress(2006/11/08発売)
  • 3連休は読書を!Kinoppy 電子書籍・電子洋書 全点ポイント30倍キャンペーン(~2/23)
  • ポイント 2,040pt (実際に付与されるポイントはご注文内容確認画面でご確認下さい)
  • 言語:ENG
  • ISBN:9781597491112
  • eISBN:9780080520773

ファイル: /

Description

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008. * The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers. * Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.

Table of Contents

1. Introduction to WarDriving and Penetration Testing 2. Understanding Antenna Theory 3. WarDriving with Handheld Devices and Direction Finding 4. Performing Penetration Testing on Wireless Networks using Linux 5. Performing Penetration Testing on Wireless Networks using OS X 6. Performing Penetration Testing on Wireless Networks using a Bootable CD Distribution 7. Mapping WarDrives 8. Using Man in the Middle Attacks to Your Advantage 9. Using Custom Firmware

最近チェックした商品