Magnifying Glass
Search Loader

Kevin Beaver & Peter T. Davis 
Hacking Wireless Networks For Dummies 

Support
Adobe DRM
Cover of Kevin Beaver & Peter T. Davis: Hacking Wireless Networks For Dummies (PDF)
Become a cyber-hero – know the common wireless weaknesses

‘Reading a book like this one is a worthy endeavor toward
becoming an experienced wireless security professional.’

–Devin Akin – CTO, The Certified Wireless Network Professional
(CWNP) Program

Wireless networks are so convenient – not only for you, but also
for those nefarious types who’d like to invade them. The only way
to know if your system can be penetrated is to simulate an attack.
This book shows you how, along with how to strengthen any weak
spots you find in your network’s armor.

Discover how to:

* Perform ethical hacks without compromising a system

* Combat denial of service and WEP attacks

* Understand how invaders think

* Recognize the effects of different hacks

* Protect against war drivers and rogue devices
€22.99
payment methods

Table of Content

Foreword xvii

Introduction 1

Part I: Building the Foundation for Testing Wireless Networks 7

Chapter 1: Introduction to Wireless Hacking 9

Chapter 2: The Wireless Hacking Process 19

Chapter 3: Implementing a Testing Methodology 31

Chapter 4: Amassing Your War Chest 43

Part II: Getting Rolling with Common Wi-Fi Hacks 65

Chapter 5: Human (In)Security 67

Chapter 6: Containing the Airwaves 81

Chapter 7: Hacking Wireless Clients 97

Chapter 8: Discovering Default Settings 113

Chapter 9: Wardriving 131

Part III: Advanced Wi-Fi Hacks 153

Chapter 10: Still at War 155

Chapter 11: Unauthorized Wireless Devices 177

Chapter 12: Network Attacks 195

Chapter 13: Denial-of-Service Attacks 225

Chapter 14: Cracking Encryption 255

Chapter 15: Authenticating Users 281

Part IV: The Part of Tens 301

Chapter 16: Ten Essential Tools for Hacking Wireless Networks 303

Chapter 17: Ten Wireless Security-Testing Mistakes 307

Chapter 18: Ten Tips for Following Up after Your Testing 321

Part V: Appendixes 325

Appendix A: Wireless Hacking Resources 327

Appendix B: Glossary of Acronyms 341

Index 347

About the author

Kevin Beaver, CISSP, is a 16-year specialist in security
assessments and incident response.

Peter T. Davis, CISSP, has worked with information
systems audits and security for 24 years.
Language English ● Format PDF ● Pages 384 ● ISBN 9780471772224 ● File size 9.2 MB ● Publisher John Wiley & Sons ● Published 2005 ● Edition 1 ● Downloadable 24 months ● Currency EUR ● ID 2329536 ● Copy protection Adobe DRM
Requires a DRM capable ebook reader

More ebooks from the same author(s) / Editor

3,240 Ebooks in this category