Details for this torrent 

SECRETS OF WIFI HACKING (KAKTOS☻☻☻)
Type:
Other > E-books
Files:
5
Size:
6.78 MiB (7110790 Bytes)
Texted language(s):
English
Tag(s):
hacking wifi wifi hacking wireless hacking wireless network hacking network penetration wifii penetration unsecured network hack hacking into wifi networks hacking wifii networks hacking the easy way
Uploaded:
2009-08-06 20:31:49 GMT
By:
kaktosjaaz
Seeders:
0
Leechers:
1
Comments
8  

Info Hash:
40CB06168FED85CDFD89945FF0624865C3B79554




(Problems with magnets links are fixed by upgrading your torrent client!)
*******************************************************************************
                   Wi-Foo - The Secrets Of Wireless Hacking
*******************************************************************************

-------------------------------------------------------------------------------
                              General Information
-------------------------------------------------------------------------------
Type.................: Ebook
Part Size............: 7,057,172 bytes




-------------------------------------------------------------------------------
                               Post Information
-------------------------------------------------------------------------------
Posted by............: ~tqw~

-------------------------------------------------------------------------------
                                 Release Notes
-------------------------------------------------------------------------------

[img]http://a1055.g.akamai.net/f/1055/1401/5h/images.barnesandnoble.com/images/1
0710000/10717288.jpg[/img]

There are plenty of wireless security books. This one’s seriously “hands-on.” It 
was written by the leaders of one of the world’s top wireless security auditing 
teams. Penetration testing is crucial to protecting yourself, and this book is 
the source for mastering it. But it doesn’t just show you how to attack 802.11 
networks -- it shows how to detect and defeat those attacks, too.

First, you’ll assemble the arsenal needed to probe wireless network security: 
hardware, drivers, utilities, network mapping and site surveying tools, and so 
forth. The authors offer knowledgeable advice on cards, chipsets, antennas, 
amplifiers, cables, connectors, Linux drivers and wireless extensions, and of 
course software tools. When it comes to the underlying hardware, they go beyond 
conventional PCs and notebooks, also discussing iPAQs and Sharp Zauruses running 
Linux: super-handy for monitoring signal strength and discovering rogue access 
points.

Once you have your toolset, you’ll walk through planning your attack, gaining 
access -- and the awful stuff that can be done once inside. By now, netadmins 
will be plenty motivated to fight back. The authors teach how, in detail. You’ll 
learn how to make the most of cryptography (not just WEP); provide effective 
user authentication, deploy higher-layer wireless VPNs, even implement a 
wireless IDS system.

We needn’t remind you just how vulnerable many 802.11 networks still are, even 
now. Let’s just say, if you want to do something about it, you’ll find this book 
indispensable. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 
15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks 
for Dummies, Second Edition.
From the Publisher

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless 
networks. Authored by world-renowned wireless security auditors, this hands-on, 
practical guide covers everything you need to attack -- or protect -- any 
wireless network.

The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 
wireless networks and their attackers. One step at a time, you'll master the 
attacker's entire arsenal of hardware and software tools: crucial knowledge for 
crackers and auditors alike. Next, you'll learn systematic countermeasures for 
building hardened wireless 'citadels''including cryptography-based techniques, 
authentication, wireless VPNs, intrusion detection, and more.

Coverage includes:

    * Step-by-step walkthroughs and explanations of typical attacks
    * Building wireless hacking/auditing toolkit: detailed recommendations, 
ranging from discovery tools to chipsets and antennas
    * Wardriving: network mapping and site surveying
    * Potential weaknesses in current and emerging standards, including 802.11i, 
PPTP, and IPSec
    * Implementing strong, multilayered defenses
    * Wireless IDS: why attackers aren't as untraceable as they think
    * Wireless hacking and the law: what's legal, what isn't 

If you're a hacker or security auditor, this book will get you in. If you're a 
netadmin, sysadmin, consultant, or home user, it will keep everyone else out.
Library Journal

WarDriving-or moving around an area to map wireless access points-presents an 
opportunity for those interested in raising awareness of wireless connectivity 
and security vulnerabilities; an opening for those looking to contribute 
connectivity through deliberately opening access; and a security threat to those 
who fail to protect their networks-even though ethical WarDrivers point out that 
they eschew unauthorized network use. WarDriving teaches how to WarDrive, from 
necessary tools to useful software; each chapter ends with a summary, bullet 
points, and FAQ. Later chapters discuss how to attack and how to defend wireless 
networks, making this useful for readers wanting to protect their networks. The 
main focus, however, may find a narrow audience in most libraries; those seeking 
books on securing their network will want to supplement with more thorough 
guides, and those interested in WarDriving may already be conversant with the 
tools and ideas discussed. A supplemental purchase for larger libraries. Wi-Foo 
covers similar ground and discusses similar utilities, yet it goes much deeper 
into the nuts and bolts of both breaking into and defending wireless networks. 
Some more technical sections are balanced out by step-by-step explanations of 
security basics and patterns of attack. Extensive appendixes range from antenna 
irradiation patterns to war-chalking symbols to a penetration testing template. 
Wireless security is an ever-growing issue, which makes this thorough guide 
recommended for larger libraries. Copyright 2004 Reed Business Information.

Slashdot.org
Uses clear language and is easy to read. ... if you're network admin or security 
professional, this book is almost a must. It's a combo of Exploiting Software 
and Hacking Exposed with specialization on wireless LANs. 

Table of Contents
Ch. 1	Real world wireless security	1
Ch. 2	Under siege	11
Ch. 3	Putting the gear together : 802.11 hardware	23
Ch. 4	Making the engine run : 802.11 drivers and utilities	43
Ch. 5	Learning to WarDrive : network mapping and site surveying	71
Ch. 6	Assembling the arsenal : tools of the trade	109
Ch. 7	Planning the attack	143
Ch. 8	Breaking through	155
Ch. 9	Looting and pillaging : the enemy inside	199
Ch. 10	Building the citadel : an introduction to wireless LAN defense	221
Ch. 11	Introduction to applied cryptography : symmetric ciphers	253
Ch. 12	Cryptographic data integrity protection, key exchange, and user 
authentication mechanisms	303
Ch. 13	The fortress gates : user authentication in wireless security	323
Ch. 14	Guarding the airwaves : deploying higher-layer wireless VPNs	383
Ch. 15	Counterintelligence : wireless IDS systems	435
App. A	Decibel-watts conversion table	457
App. B	802.11 wireless equipment	461
App. C	Antenna irradiation patterns	469
App. D	Wireless utilities manpages	475
App. E	Signal loss for obstacle types	503
App. F	Warchalking signs	505
App. G	Wireless penetration testing template	507
App. H	Default SSIDs for several common 802.11 products	523

Product Details

    * ISBN: 0321202171
    * ISBN-13: 9780321202178
    * Format: Paperback, 555pp
    * Publisher: Pearson Education
    * Pub. Date: April 2004

Tracker: http://tpb.tracker.piratebayproxy.live:80/announce

-------------------------------------------------------------------------------
                                 Install Notes
-------------------------------------------------------------------------------
Adobe Acrobat Reader
































































































































-------------------------------------------------------------------------------
Generated with Cool NFO Creator - http://fly.to/coolbeans
-------------------------------------------------------------------------------

File list not available.

Comments

Thank u guys for downloading,pls continue seeding:-D ----KAKTOS???
our friend ~tqw~ always posts very good work
Well , i really respect the original uploaders thats the reason i let their identity disclosed in every possible way i can :-D
Works great, thanks!
Great job. Thanks!
thanx dude
2004 called - it wants it WEP info back....
thinks