𝔖 Scriptorium
✦   LIBER   ✦

📁

Wireless Reconnaissance in Penetration Testing

✍ Scribed by Matthew Neely, Alex Hamerstone, Chris Sanyk


Publisher
Syngress
Year
2012
Tongue
English
Leaves
168
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.

  • Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testing
  • Includes real-world case studies of actual penetration tests using radio profiling
  • Covers data leakage, frequency, attacks, and information gathering

✦ Table of Contents


Content:
Front Matter, Pages i-ii
Copyright, Page iv
Dedication, Page v
Author Biography, Page xi
Preface, Pages xiii-xvi
Chapter 1 - Why Radio Profiling?, Pages 1-6, Matthew Neely, Alex Hamerstone, Chris Sanyk
Chapter 2 - Basic Radio Theory and Introduction to Radio Systems, Pages 7-43, Matthew Neely, Alex Hamerstone, Chris Sanyk
Chapter 3 - Targets, Pages 45-47, Matthew Neely, Alex Hamerstone, Chris Sanyk
Chapter 4 - Offsite Profiling, Pages 49-63, Matthew Neely, Alex Hamerstone, Chris Sanyk
Chapter 5 - Onsite Radio Profiling, Pages 65-86, Matthew Neely, Alex Hamerstone, Chris Sanyk
Chapter 6 - How to Use the Information You Gather, Pages 87-90, Matthew Neely, Alex Hamerstone, Chris Sanyk
Chapter 7 - Basic Overview of Equipment and How it Works, Pages 91-117, Matthew Neely, Alex Hamerstone, Chris Sanyk
Chapter 8 - The House Doesn’t Always Win: A Wireless Reconnaissance Case Study, Pages 119-125, Matthew Neely, Alex Hamerstone, Chris Sanyk
Chapter 9 - New Technology, Pages 127-151, Matthew Neely, Alex Hamerstone, Chris Sanyk
Glossary, Pages 153-159
Index, Pages 161-166


📜 SIMILAR VOLUMES


Wireless reconnaissance in penetration t
✍ Neely, Matthew; Sanyk, Chris; Hamerstone, Alex 📂 Library 📅 2013 🏛 Elsevier/Syngress 🌐 English

<p>In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. <i>Wireless Reconnaissance in Penetration Testing</i> describes th

Wireless reconnaissance in penetration t
✍ Hamerstone, Alex;Neely, Matthew;Sanyk, Chris 📂 Library 📅 2013;2012 🏛 Elsevier Science;Elsevier;Syngress 🌐 English

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many way

Wireless reconnaissance in penetration t
✍ Hamerstone, Alex;Neely, Matthew;Sanyk, Chris 📂 Library 📅 2013 🏛 Elsevier;Syngress 🌐 English

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many way

Wardriving & Wireless Penetration Testin
✍ Chris Hurley Russ Rogers Frank Thornton Daniel Connelly Brian Baker 📂 Library 📅 2007 🌐 English

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent

Wardriving & Wireless Penetration Testin
✍ Hurley C., Rogers R., Thornton F. 📂 Library 📅 2006 🌐 English

WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks. As wireless networking continues to spread in corporate and govern