Atjaunināt sīkdatņu piekrišanu

E-grāmata: Hacking Exposed Wireless, Second Edition: Wireless Security Secrets and Solutions

3.99/5 (131 ratings by Goodreads)
  • Formāts: 512 pages
  • Sērija : Hacking Exposed
  • Izdošanas datums: 05-Aug-2010
  • Izdevniecība: McGraw-Hill Professional
  • Valoda: eng
  • ISBN-13: 9780071666626
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 67,27 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 512 pages
  • Sērija : Hacking Exposed
  • Izdošanas datums: 05-Aug-2010
  • Izdevniecība: McGraw-Hill Professional
  • Valoda: eng
  • ISBN-13: 9780071666626
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [ 4]

Featuring seven new chapters covering the latest wireless security tools and techniques, this guide provides an overview for defending against wireless network attacks, including Bluetooth, custom security tools and wireless regulations including PCI compliance. Original.

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed™ Wireless, Second Edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide



The latest techniques for securing wireless networks using the proven the Hacking Exposed methodology

Filled with tactical security information, Hacking Exposed Wireless, Second Edition sheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. The book includes vital details on new, previously unpublished attacks alongside real-world, proven countermeasures. Seven new chapters discuss in depth how to conduct an assessment from start to finish, secure Bluetooth networks, write custom wireless security tools, and ensure compliance with the latest wireless laws and regulations.

Hacking Exposed Wireless, Second Edition features:

  • Thorough updates for the latest wireless threats and techniques
  • Information on wireless laws and regulations including how to meet PCI wireless security requirements
  • Content written by world-renowned wireless security experts
  • Global examples throughout

Comprehensive coverage of wireless network security:
Wireless Fundamentals; An Overview of Wireless Security; Radio Frequency Fundamentals; Introduction to 802.11; Hacking 802.11 Wireless Networks; Building Your Wireless Hacking Toolkits; Scoping and Information Gathering; Discovering Wireless Targets; Scanning and Enumeration of 802.11 Networks; Attacking 802.11 Wireless Networks; Attacking WPA-protected 802.11 Networks; Attacking 802.11 Wireless Clients; Defending Your Wireless Network; Hacking Additional Wireless Technologies; Hacking Hotspots; Bluetooth Basics; Attacking Bluetooth Security; Other Wireless Protocols; Writing Your Own Wireless Security Tools; Wireless Hacking Laws and Regulations

Foreword xvii
Acknowledgments xix
Introduction xxi
Part I Hacking 802.11 Wireless Technology
Case Study: Wireless Hacking for Hire
2(5)
Her First Engagement
2(1)
A Parking Lot Approach
2(1)
The Robot Invasion
3(1)
Final Wrap-Up
4(3)
1 Introduction to 802.11 Hacking
7(34)
802.11 In a Nutshell
8(5)
The Basics
8(1)
Addressing in 802.11 Packets
9(1)
802.11 Security Primer
9(4)
Discovery Basics
13(8)
Hardware and Drivers
21(19)
A Note on the Linux Kernel
21(1)
Chipsets and Linux Drivers
22(2)
Modern Chipsets and Drivers
24(2)
Cards
26(7)
Antennas
33(4)
Cellular Data Cards
37(1)
GPS
38(2)
Summary
40(1)
2 Scanning and Enumerating 802.11 Networks
41(38)
Choosing an Operating System
42(1)
Windows
42(1)
OS X
42(1)
Linux
43(1)
Windows Discovery Tools
43(7)
Vistumbler
44(4)
inSSIDer
48(2)
Windows Sniffing/Injection Tools
50(11)
NDIS 6.0 Monitor Mode Support (NetMon)
50(4)
AirPcap
54(2)
CommView for WiFi
56(5)
OS X Discovery Tools
61(6)
KisMAC
61(6)
Kismet on OS X
67(1)
Linux Discovery Tools
67(6)
Kismet
67(6)
Mobile Discovery Tools
73(2)
Online Mapping Services (WIGLE and Skyhook)
75(2)
Summary
77(2)
3 Attacking 802.11 Wireless Networks
79(36)
Basic Types of Attacks
80(1)
Security Through Obscurity
80(8)
Defeating WEP
88(16)
WEP Key Recovery Attacks
88(16)
Bringing It All Together: Cracking a Hidden Mac-Filtering WEP-Encrypted Network
104(7)
Keystream Recovery Attacks Against WEP
107(4)
Attacking the Availability of Wireless Networks
111(2)
Summary
113(2)
4 Attacking WPA-Protected 802.11 Networks
115(39)
Breaking Authentication: WPA-PSK
116(13)
Breaking Authentication: WPA Enterprise
129(12)
Obtaining the EAP Handshake
129(2)
LEAP
131(2)
PEAP and EAP-TTLS
133(3)
EAP-TLS
136(1)
EAP-FAST
137(2)
EAP-MD5
139(2)
Breaking Encryption: TKIP
141(5)
Attacking Components
146(5)
Summary
151(3)
Part II Hacking 802.11 Clients
Case Study: Riding the Insecure Airwaves
154(1)
5 Attack 802.11 Wireless Clients
155(48)
Attacking the Application Layer
157(4)
Attacking Clients Using an Evil DNS Server
161(4)
Ettercap Support for Content Modification
165(2)
Dynamically Generating Rogue APs and Evil Servers with Karmetasploit
167(5)
Direct Client Injection Techniques
172(10)
Injecting Data Packets with AirPWN
172(3)
Generic Client-side Injection with airtun-ng
175(2)
Munging Software Updates with IPPON
177(5)
Device Driver Vulnerabilities
182(5)
Fingerprinting Device Drivers
186(1)
Web Hacking and Wi-Fi
187(14)
Hacking DNS via XSRF Attacks Against Routers
197(4)
Summary
201(2)
6 Taking It All The Way: Bridging the Airgap from OS X
203(36)
The Game Plan
204(13)
Preparing the Exploit
204(5)
Prepping the Callback
209(1)
Performing Initial Reconnaissance
210(1)
Preparing Kismet, Aircrack-ng
211(2)
Prepping the Package
213(1)
Exploiting WordPress to Deliver the Java Exploit
214(3)
Making the Most of User-level Code Execution
217(21)
Gathering 802.11 Intel (User-level Access)
219(1)
Popping Root by Brute-forcing the Keychain
220(6)
Returning Victorious to the Machine
226(3)
Managing OS X's Firewall
229(9)
Summary
238(1)
7 Taking It All the Way: Bridging the Airgap from Windows
239(31)
The Attack Scenario
240(1)
Preparing for the Attack
241(7)
Exploiting Hotspot Environments
243(4)
Controlling the Client
247(1)
Local Wireless Reconnaissance
248(7)
Remote Wireless Reconnaissance
255(8)
Windows Monitor Mode
256(1)
Microsoft NetMon
257(6)
Target Wireless Network Attack
263(4)
Summary
267(3)
Part III Hacking Additional Wireless Technologies
Case Study: Snow Day
270(3)
8 Bluetooth Scanning and Reconnaissance
273(42)
Bluetooth Technical Overview
274(5)
Device Discovery
275(1)
Protocol Overview
275(3)
Bluetooth Profiles
278(1)
Encryption and Authentication
278(1)
Preparing for an Attack
279(3)
Selecting a Bluetooth Attack Device
279(3)
Reconnaissance
282(27)
Active Device Discovery
282(8)
Passive Device Discovery
290(3)
Hybrid Discovery
293(3)
Passive Traffic Analysis
296(13)
Service Enumeration
309(4)
Summary
313(2)
9 Bluetooth Eavesdropping
315(30)
Commercial Bluetooth Sniffing
316(10)
Open-Source Bluetooth Sniffing
326(17)
Summary
343(2)
10 Attacking and Exploiting Bluetooth
345(54)
PIN Attacks
346(14)
Practical PIN Cracking
352(8)
Identity Manipulation
360(14)
Bluetooth Service and Device Class
360(4)
Bluetooth Device Name
364(10)
Abusing Bluetooth Profiles
374(22)
Testing Connection Access
375(2)
Unauthorized AT Access
377(4)
Unauthorized PAN Access
381(4)
Headset Profile Attacks
385(6)
File Transfer Attacks
391(5)
Future Outlook
396(2)
Summary
398(1)
11 Hack ZigBee
399(40)
ZigBee Introduction
400(7)
ZigBee's Place as a Wireless Standard
400(1)
ZigBee Deployments
401(1)
ZigBee History and Evolution
402(1)
ZigBee Layers
402(4)
ZigBee Profiles
406(1)
ZigBee Security
407(3)
Rules in the Design of ZigBee Security
407(1)
ZigBee Encryption
408(1)
ZigBee Authenticity
409(1)
ZigBee Authentication
409(1)
ZigBee Attacks
410(20)
Introduction to KillerBee
411(5)
Network Discovery
416(2)
Eavesdropping Attacks
418(6)
Replay Attacks
424(3)
Encryption Attacks
427(3)
Attack Walkthrough
430(8)
Network Discovery and Location
430(2)
Analyzing the ZigBee Hardware
432(4)
RAM Data Analysis
436(2)
Summary
438(1)
12 Hack DECT
439(20)
DECT Introduction
440(4)
DECT Profiles
441(1)
DECT PHY Layer
441(2)
DECT MAC Layer
443(1)
Base Station Selection
444(1)
DECT Security
444(3)
Authentication and Pairing
445(1)
Encryption Services
446(1)
DECT Attacks
447(11)
DECT Hardware
448(1)
DECT Eavesdropping
449(6)
DECT Audio Recording
455(3)
Summary
458(1)
A Scoping and Information Gathering
459(12)
Pre-assessment
460(9)
Scoping
460(2)
Things to Bring to a Wireless Assessment
462(2)
Conducting Scoping Interviews
464(1)
Gathering Information via Satellite Imagery
465(4)
Putting It All Together
469(2)
Index 471
Johnny Cache (Virginia) received his Masters in Computer Science from the Naval Postgraduate School in 2006. His thesis work, which focused on fingerprinting 802.11 device drivers, won the Gary Kildall award for the most innovative computer science thesis. Johnny wrote his first program on a Tandy 128K color computer sometime in 1988. Since then he has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. He has also released a number of papers related to 802.11 security, and is the author of many wireless tools. He is the founder and Chief Science Officer of Cache Heavy Industries.





Joshua Wright (Rhode Island) is a senior technical analyst with Counter Hack, and a senior instructor and author for the SANS Institute. Through his experiences as a penetration tester, Josh has worked with hundreds of organizations on attacking and defending mobile devices and wireless systems, disclosing significant product and protocol security weaknesses to well-known organizations. As an open-source software advocate, Josh has conducted cutting-edge research resulting in several software tools that are commonly used to evaluate the security of widely deployed technology targeting WiFi, Bluetooth, ZigBee, and Z-Wave wireless systems, smart grid deployments, and the Android and Apple iOS mobile device platforms. In his spare time, Josh looks for any opportunity to void a warranty on his electronics.





McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide