Atjaunināt sīkdatņu piekrišanu

Hacking Exposed Wireless, Third Edition 3rd edition [Mīkstie vāki]

3.99/5 (132 ratings by Goodreads)
  • Formāts: Paperback / softback, 544 pages, height x width x depth: 231x185x28 mm, weight: 929 g, 190 Illustrations
  • Sērija : Hacking Exposed
  • Izdošanas datums: 16-Apr-2015
  • Izdevniecība: McGraw-Hill Professional
  • ISBN-10: 0071827633
  • ISBN-13: 9780071827638
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 76,53 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 544 pages, height x width x depth: 231x185x28 mm, weight: 929 g, 190 Illustrations
  • Sērija : Hacking Exposed
  • Izdošanas datums: 16-Apr-2015
  • Izdevniecība: McGraw-Hill Professional
  • ISBN-10: 0071827633
  • ISBN-13: 9780071827638
Citas grāmatas par šo tēmu:
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.









Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, youll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave.





Assemble a wireless attack toolkit and master the hackers weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks using Ettercap and the WiFi Pineapple Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS Exploit holes in WPA and WPA2 personal and enterprise security schemes Leverage rogue hotspots to deliver remote access software through fraudulent software updates Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic Capture and evaluate proprietary wireless technology with Software Defined Radio tools Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices Attack remote wireless networks using compromised Windows systems and built-in tools
Foreword xv
Acknowledgments xvii
Introduction xix
Part I Hacking 802.11 Wireless Technology
Case Study: Twelve Volt Hero
2(1)
1 Introduction to 802.11 Hacking
3(28)
802.11 in a Nutshell
4(5)
The Basics
4(1)
Addressing in 802.11 Packets
5(1)
802.11 Security Primer
5(4)
Discovery Basics
9(7)
Hardware and Drivers
16(14)
A Note on the Linux Kernel
16(1)
Chipsets and Linux Drivers
17(1)
Modern Chipsets and Drivers
18(2)
Cards
20(5)
Antennas
25(3)
Cellular Data Cards
28(1)
GPS
28(2)
Summary
30(1)
2 Scanning and Enumerating 802.11 Networks
31(32)
Choosing an Operating System
32(1)
Windows
32(1)
OS X
32(1)
Linux
32(1)
Windows Discovery Tools
33(3)
Vistumbler
33(3)
Windows Sniffing/Injection Tools
36(8)
NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer)
36(2)
AirPcap
38(2)
CommView for WiFi
40(4)
OS X Discovery Tools
44(4)
KisMAC
44(4)
Linux Discovery Tools
48(8)
airodump-ng
48(5)
Kismet
53(3)
Advanced Visualization Techniques (PPI)
56(6)
Visualizing PPI-Tagged Kismet Data
57(2)
PPI-Based Triangulation (Servo-Bot)
59(3)
Summary
62(1)
3 Attacking 802.11 Wireless Networks
63(26)
Basic Types of Attacks
64(1)
Security Through Obscurity
64(7)
Defeating WEP
71(12)
WEP Key Recovery Attacks
71(12)
Putting It All Together with Wifite
83(4)
Installing Wifite on a WiFi Pineapple
83(4)
Summary
87(2)
4 Attacking WPA-Protected 802.11 Networks
89(38)
Obtaining the Four-Way Handshake
91(4)
Cracking with Cryptographic Acceleration
95(14)
Breaking Authentication: WPA Enterprise
109(17)
Obtaining the EAP Handshake
110(1)
EAP-MD5
111(2)
EAP-GTC
113(1)
LEAP
114(1)
EAP-FAST
115(2)
EAP-TLS
117(1)
PEAP and EAP-TTLS
118(2)
Running a Malicious RADIUS Server
120(6)
Summary
126(1)
5 Attacking 802.11 Wireless Clients
127(28)
browser_autopwn: A Poor Man's Exploit Server
128(4)
Using Metasploit browser_autopwn
129(3)
Getting Started with I-love-my-neighbors
132(4)
Creating the AP
133(1)
Assigning an IP Address
134(1)
Setting Up the Routes
134(1)
Redirecting HTTP Traffic
135(1)
Serving HTTP Content with Squid
136(1)
Attacking Clients While Attached to an AP
136(6)
Associating to the Network
137(5)
ARP Spoofing
142(10)
Direct Client Injection Techniques
152(2)
Summary
154(1)
6 Taking It All the Way: Bridging the Air-Gap from Windows 8
155(35)
Preparing for the Attack
157(7)
Exploiting Hotspot Environments
161(2)
Controlling the Client
163(1)
Local Wireless Reconnaissance
164(7)
Remote Wireless Reconnaissance
171(9)
Windows Monitor Mode
173(1)
Microsoft NetMon
173(7)
Target Wireless Network Attack
180(7)
Summary
187(3)
Part II Bluetooth
Case Study: You Can Still Hack What You Can't See
190(1)
7 Bluetooth Classic Scanning and Reconnaissance
191(38)
Bluetooth Classic Technical Overview
192(5)
Device Discovery
193(1)
Protocol Overview
193(3)
Bluetooth Profiles
196(1)
Encryption and Authentication
196(1)
Preparing for an Attack
197(2)
Selecting a Bluetooth Classic Attack Device
197(2)
Reconnaissance
199(22)
Active Device Discovery
200(10)
Passive Device Discovery
210(1)
Hybrid Discovery
211(3)
Passive Traffic Analysis
214(7)
Service Enumeration
221(6)
Summary
227(2)
8 Bluetooth Low Energy Scanning and Reconnaissance
229(20)
Bluetooth Low Energy Technical Overview
230(7)
Physical Layer Behavior
231(1)
Operating Modes and Connection Establishment
231(1)
Frame Configuration
232(3)
Bluetooth Profiles
235(1)
Bluetooth Low Energy Security Controls
235(2)
Scanning and Reconnaissance
237(10)
Summary
247(2)
9 Bluetooth Eavesdropping
249(38)
Bluetooth Classic Eavesdropping
250(15)
Open Source Bluetooth Classic Sniffing
251(4)
Commercial Bluetooth Classic Sniffing
255(10)
Bluetooth Low Energy Eavesdropping
265(11)
Bluetooth Low Energy Connection Following
267(7)
Bluetooth Low Energy Promiscuous Mode Following
274(2)
Exploiting Bluetooth Networks Through Eavesdropping Attacks
276(9)
Summary
285(2)
10 Attacking and Exploiting Bluetooth
287(39)
Bluetooth PIN Attacks
288(12)
Bluetooth Classic PIN Attacks
289(5)
Bluetooth Low Energy PIN Attacks
294(3)
Practical Pairing Cracking
297(3)
Device Identity Manipulation
300(4)
Bluetooth Service and Device Class
300(4)
Abusing Bluetooth Profiles
304(10)
Testing Connection Access
304(2)
Unauthorized PAN Access
306(4)
File Transfer Attacks
310(4)
Attacking Apple iBeacon
314(9)
iBeacon Deployment Example
315(8)
Summary
323(3)
Part III More Ubiquitous Wireless
Case Study: Failure Is Not an Option
326(1)
11 Software-Defined Radios
327(32)
SDR Architecture
328(2)
Choosing a Software Defined Radio
330(3)
RTL-SDR: Entry-Level Software-Defined Radio
331(1)
HackRF: Versatile Software-Defined Radio
332(1)
Getting Started with SDRs
333(9)
Setting Up Shop on Windows
333(1)
Setting Up Shop on Linux
333(2)
SDR# and gqrx: Scanning the Radio Spectrum
335(7)
Digital Signal Processing Crash Course
342(15)
Rudimentary Communication
343(1)
Rudimentary (Wireless) Communication
343(1)
POCSAG
344(1)
Information as Sound
345(1)
Picking Your Target
346(1)
Finding and Capturing an RF Transmission
347(1)
Blind Attempts at Replay Attacks
348(8)
So What?
356(1)
Summary
357(2)
12 Hacking Cellular Networks
359(46)
Fundamentals of Cellular Communication
360(2)
Cellular Network RF Frequencies
360(1)
Standards
361(1)
2G Network Security
362(25)
GSM Network Model
363(1)
GSM Authentication
363(2)
GSM Encryption
365(1)
GSM Attacks
365(1)
GSM Eavesdropping
366(8)
GSM A5/1 Key Recovery
374(9)
GSM IMSI Catcher
383(4)
Femtocell Attacks
387(9)
4G/LTE Security
396(7)
LTE Network Model
397(1)
LTE Authentication
398(2)
LTE Encryption
400(1)
Null Algorithm
401(1)
Encryption Algorithms
401(1)
Platform Security
401(2)
Summary
403(2)
13 Hacking ZigBee
405(56)
ZigBee Introduction
406(7)
ZigBee's Place as a Wireless Standard
407(1)
ZigBee Deployments
407(1)
ZigBee History and Evolution
408(1)
ZigBee Layers
409(4)
ZigBee Profiles
413(1)
ZigBee Security
413(4)
Rules in the Design of ZigBee Security
414(1)
ZigBee Encryption
414(1)
ZigBee Authenticity
415(1)
ZigBee Authentication
416(1)
ZigBee Attacks
417(34)
Introduction to KillerBee
417(9)
Network Discovery
426(1)
Eavesdropping Attacks
427(9)
Replay Attacks
436(3)
Encryption Attacks
439(2)
Packet Forging Attacks
441(10)
Attack Walkthrough
451(7)
Network Discovery and Location
451(2)
Analyzing the ZigBee Hardware
453(3)
RAM Data Analysis
456(2)
Summary
458(3)
14 Hacking Z-Wave Smart Homes
461(38)
Z-Wave Introduction
462(12)
Z-Wave Layers
462(8)
Z-Wave Security
470(4)
Z-Wave Attacks
474(23)
Eavesdropping Attacks
474(17)
Z-Wave Injection Attacks
491(6)
Summary
497(2)
Index 499
Joshua Wright (Rhode Island) is a senior technical analyst with Counter Hack, and a senior instructor and author for the SANS Institute. Through his experiences as a penetration tester, Josh has worked with hundreds of organizations on attacking and defending mobile devices and wireless systems, disclosing significant product and protocol security weaknesses to well-known organizations. As an open-source software advocate, Josh has conducted cutting-edge research resulting in several software tools that are commonly used to evaluate the security of widely deployed technology targeting WiFi, Bluetooth, ZigBee, and Z-Wave wireless systems, smart grid deployments, and the Android and Apple iOS mobile device platforms. In his spare time, Josh looks for any opportunity to void a warranty on his electronics.





Johnny Cache (Virginia) received his Masters in Computer Science from the Naval Postgraduate School in 2006. His thesis work, which focused on fingerprinting 802.11 device drivers, won the Gary Kildall award for the most innovative computer science thesis. Johnny wrote his first program on a Tandy 128K color computer sometime in 1988. Since then he has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. He has also released a number of papers related to 802.11 security, and is the author of many wireless tools. He is the founder and Chief Science Officer of Cache Heavy Industries.