-
Hacking Wireless Networks for dummies
- 點閱:33
- 作者: by Kevin Beaver, Peter T. Davis
- 出版社:Wiley Publishing, Inc.
- 出版年:2005
- 集叢名:--For dummies
- ISBN:9780764597305; 9780471772224
- 格式:PDF,JPG
This book covers the topic of ethically hacking 802.11 wireless networks (WLANs). It explores the process of performing penetration tests on ones own wireless systems using the same tools and techniques malicious hackers use with the end goal being to find security vulnerabilities and plug the holes before the bad guys exploit them. This book will provide readers with technical knowledge and real-world examples on how various WLAN hack attacks are performed as well as practical advice on how to remediate the security vulnerabilities. The hack attacks covered include physical security, denial of service, wired equivalent privacy (WEP), user authentication, and more.
- Foreword(第xvii頁)
- Introduction(第1頁)
- Who Should Read This Book?(第2頁)
- About This Book(第2頁)
- How to Use This Book(第2頁)
- Foolish Assumptions(第3頁)
- How This Book Is Organized(第3頁)
- Icons Used in This Book(第5頁)
- Where to Go from Here(第6頁)
- Part I: Building the Foundation for Testing Wireless Networks(第7頁)
- Chapter 1: Introduction to Wireless Hacking(第9頁)
- Chapter 2: The Wireless Hacking Process(第19頁)
- Chapter 3: Implementing a Testing Methodology(第31頁)
- Chapter 4: Amassing Your War Chest(第43頁)
- Part II: Getting Rolling with Common Wi-Fi Hacks(第65頁)
- Chapter 5: Human (In) Security(第67頁)
- Chapter 6: Containing the Airwaves(第81頁)
- Chapter 7: Hacking Wireless Clients(第97頁)
- Chapter 8: Discovering Default Settings(第113頁)
- Chapter 9: Wardriving(第131頁)
- Part III: Advanced Wi-Fi Hacks(第153頁)
- Chapter 10: Still at War(第155頁)
- Chapter 11: Unauthorized Wireless Devices(第177頁)
- Chapter 12: Network Attacks(第195頁)
- Chapter 13: Denial-of-Service Attacks(第225頁)
- Chapter 14: Cracking Encryption(第255頁)
- Chapter 15: Authenticating Users(第281頁)
- Part IV: The Part of Tens(第301頁)
- Chapter 16: Ten Essential Tools for Hacking Wireless Networks(第303頁)
- Chapter 17: Ten Wireless Security-Testing Mistakes(第307頁)
- Chapter 18: Ten Tips for Following Up after Your Testing(第321頁)
- Part V: Appendixes(第325頁)
- Appendix A: Wireless Hacking Resources(第327頁)
- Appendix B: Glossary of Acronyms(第341頁)
- Index(第347頁)