Synopses & Reviews
The latest wireless security solutions
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide.
- Build and configure your Wi-Fi attack arsenal with the best hardware and software tools
- Explore common weaknesses in WPA2 networks through the eyes of an attacker
- Leverage post-compromise remote client attacks on Windows 7 and Mac OS X
- Master attack tools to exploit wireless systems, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, and the all new KillerBee
- Evaluate your threat to software update impersonation attacks on public networks
- Assess your threat to eavesdropping attacks on Wi-Fi, Bluetooth, ZigBee, and DECT networks using commercial and custom tools
- Develop advanced skills leveraging Software Defined Radio and other flexible frameworks
- Apply comprehensive defenses to protect your wireless devices and infrastructure
Synopsis
Secure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.
- Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
- Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
- Defend against WEP key brute-force, aircrack, and traffic injection hacks
- Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
- Prevent rogue AP and certificate authentication attacks
- Perform packet injection from Linux
- Launch DoS attacks using device driver-independent tools
- Exploit wireless device drivers using the Metasploit 3.0 Framework
- Identify and avoid malicious hotspots
- Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys
About the Author
Johnny Cache received his Masters in Computer Science from the Naval Postgraduate School in 2006. His thesis work, which focused on fingerprinting 802.11 device drivers, won the Gary Kildall award for the most innovative computer science thesis. Johnny wrote his first program on a Tandy 128K color computer sometime in 1988. Since then he has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. He has also released a number of papers related to 802.11 security, and is the author of many wireless tools. Most of his wireless utilities are included in the Airbase suite, available at 802.11mercenary.net.Vincent Liu , CISSP is the Managing Director at Stach and Liu, a professional services firm providing IT security consulting to the Fortune 500, national law firms, and global financial institutions. Before founding Stach and Liu, Vincent led the Attack and Penetration and Reverse Engineering teams for the Global Security unit at Honeywell International. Prior to that, he was a consultant with the Ernst and Young Advanced Security Centers and an analyst at the National Security Agency. Vincent is a developer for the Metasploit Project and an experienced speaker, having presented his research at conferences including BlackHat, ToorCon, and Microsoft BlueHat. Vincent has been published in interviews, journals, and books with highlights including: Penetration Testers Open Source Toolkit; Writing Security Tools and Exploits; Sockets, and Shellcode, Porting, and Coding. Vincent holds a Bachelor of Science and Engineering from the University of Pennsylvania with a major in Computer Science and Engineering and a minor in Psychology.
Table of Contents
Part I: 802.11 Wireless TechnologyChapter 1: Hacking 802.11Chapter 2: Discover and VerifyChapter 3: Capture and AnalyzeChapter 4: Basic AttacksChapter 5: Decryption AttacksChapter 6: Authentication AttacksChapter 7: Man-In-The-Middle attacksChapter 8: VPN AttacksChapter 9: Denial of ServiceChapter 10: 802.11 Intrusion Detection and PreventionChapter 11: 802.11 DefensesChapter 12: Other 802.11 related attacksPart II: Other Wireless TechnologiesChapter 13: Hacking BluetoothChapter 14: 3G Wireless ServicesChapter 15: Text Service InterceptionChapter 16: Scanners and RF MonitoringChapter 17: IRDA Chapter 18: RFIDChapter 19: Emerging Technologies