The only way to stop a hacker is to think like one!Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable
Kismet Hacking [wireless networks]
โ Scribed by Brad Haines, Frank Thornton, Michael Schearer
- Publisher
- Syngress
- Year
- 2008
- Tongue
- English
- Leaves
- 261
- Edition
- Pap/Dig
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
Wardrive Running Kismet from the BackTrack Live CD
Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive
๐ SIMILAR VOLUMES
With the arrival of IEEE 802.11b (a.k.a. WiFi) and other wireless networking technologies on the market comes a wave of stories about snoops intercepting sensitive LAN traffic from out in the company parking lot or across the concourse at the airport. Hack Proofing Your Wireless Network takes a look
This book covers the topic of ethically hacking 802.11 wireless networks (WLANs). It explores the process of performing penetration tests on one's own wireless systems using the same tools and techniques malicious hackers use with the end goal being to find security vulnerabilities and plug the hole
Become a cyber-hero - know the common wireless weaknesses <p> "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program <p> Wireless networks are so