<p>In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. <i>Wireless Reconnaissance in Penetration Testing</i>ย describes th
Wireless reconnaissance in penetration testing
โ Scribed by Neely, Matthew; Sanyk, Chris; Hamerstone, Alex
- Publisher
- Elsevier/Syngress
- Year
- 2013
- Tongue
- English
- Leaves
- 226
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testingย describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.
- Author Matthew Neely is a respected and well-known expert and speakerย on radio reconnaissance and penetration testing
- Includes real-world case studies of actual penetration tests using radio profiling
- Covers data leakage, frequency, attacks, and information gathering
โฆ Table of Contents
Content: Forntmatter
Wireless Reconnaissance in Penetration Testing
Copyright
Dedication
Contents
Author Biography
Preface
1 Why Radio Profiling?
Guard Radios, Wireless Headsets, Cordless Phones, Wireless Cameras, Building Control Systems
Case Study
2 Basic Radio Theory and Introduction to Radio Systems
The Electromagnetic Spectrum
Terminology
Wavelength/Frequency Characteristics
How Materials Affect Radio Waves
Multipath
Regulatory Agencies
Applying the Science: Radio Technology Basics
Filters
Antennas
Antenna Theory
Signal Strength
Antenna Diagrams
Popular Types of Antennas. Omnidirectional and Directional AntennasTypes of Omnidirectional Antennas
Types of Directional Antennas
Modulation
Analog Modulation
Common Analog Modulation Types
Digital Modulation
APCO P-25
Common Types of Spread Spectrum Modulation
Radio Systems
Simplex and Duplex
Simplex
Two-Frequency Simplex
Duplex
Repeaters
Media Access Control in Radio
CTCSS
Reconnaissance of CTCSS Equipped Radios
Digital Code System
Trunking
Trunked Radio Systems in Depth
Manufacturers of Trunked Radio Systems
Monitoring Trunked Radio Systems
Summary
Further Learning
3 Targets. Two-Way Radios Used for Verbal CommunicationDevices that Use Radio Frequencies
4 Offsite Profiling
What is Offsite Profiling?
What to Look For
Using RadioReference.com for Offsite Profiling
Case Study: Offsite Profiling
Remediation and Lessons Learned
5 Onsite Radio Profiling
Initial Onsite Reconnaissance
The Guard Force
Using a Frequency Counter
Visual Recon
Antennas
Search Common Frequency Ranges
Family Radio Service (FRS)
General Mobile Radio Service (GMRS)
Multi Use Radio Service (MURS)
Dot Frequencies
Common Ranges
Common Business Ranges. Common Cordless Phone and Headset RangesScanner Tips
Finding Trunked Systems
Case Study: Onsite Profiling
Remediation and Lessons Learned
Who is Guarding the Guards?
6 How to Use the Information You Gather
Who is Guarding the Guards?
Monitoring Phone Calls
Monitoring Phone Calls
Wireless Cameras
Pan Tilt Zoom (PTZ) Cameras
Wireless Cameras
Pan Tilt Zoom (PTZ) Cameras
Common Scanner Controls and Features
Channels and Banks
7 Basic Overview of Equipment and How it Works
Common Scanner Controls and Features
Channels and Banks
Squelch
Scan Button
Hold Button
Squelch. Scan ButtonHold Button
Manual Button
Program
Lockout Button
Search
Manual Button
Program
Lockout Button
Search
Priority
Selecting a Scanner
Priority
Selecting a Scanner
Form Factor
Programmable Verse Pre-Programmed Scanners
Form Factor
Programmable Verse Pre-Programmed Scanners
Frequency Coverage
Frequency Coverage
Useful Scanner Feature
Number Pad
Useful Scanner Feature
Number Pad
Lighted Screens and Keyboards
Channel Spacing/Steps
Lighted Screens and Keyboards
Channel Spacing/Steps
Scan Speed
Modulation
Scan Speed
Modulation
APCO P-25 Decoding
Trunk Tracking.
๐ SIMILAR VOLUMES
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many way
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many way
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent
WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks. As wireless networking continues to spread in corporate and govern