SECRETS OF WIFI HACKING (KAKTOS☻☻☻)
- Type:
- Other > E-books
- Files:
- 5
- Size:
- 6.78 MiB (7110790 Bytes)
- Texted language(s):
- English
- Tag(s):
- hacking wifi wifi hacking wireless hacking wireless network hacking network penetration wifii penetration unsecured network hack hacking into wifi networks hacking wifii networks hacking the easy way
- Uploaded:
- 2009-08-06 20:31:49 GMT
- By:
- kaktosjaaz
- Seeders:
- 0
- Leechers:
- 1
- Comments
- 8
- Info Hash: 40CB06168FED85CDFD89945FF0624865C3B79554
(Problems with magnets links are fixed by upgrading your torrent client!)
******************************************************************************* Wi-Foo - The Secrets Of Wireless Hacking ******************************************************************************* ------------------------------------------------------------------------------- General Information ------------------------------------------------------------------------------- Type.................: Ebook Part Size............: 7,057,172 bytes ------------------------------------------------------------------------------- Post Information ------------------------------------------------------------------------------- Posted by............: ~tqw~ ------------------------------------------------------------------------------- Release Notes ------------------------------------------------------------------------------- [img]http://a1055.g.akamai.net/f/1055/1401/5h/images.barnesandnoble.com/images/1 0710000/10717288.jpg[/img] There are plenty of wireless security books. This one’s seriously “hands-on.†It was written by the leaders of one of the world’s top wireless security auditing teams. Penetration testing is crucial to protecting yourself, and this book is the source for mastering it. But it doesn’t just show you how to attack 802.11 networks -- it shows how to detect and defeat those attacks, too. First, you’ll assemble the arsenal needed to probe wireless network security: hardware, drivers, utilities, network mapping and site surveying tools, and so forth. The authors offer knowledgeable advice on cards, chipsets, antennas, amplifiers, cables, connectors, Linux drivers and wireless extensions, and of course software tools. When it comes to the underlying hardware, they go beyond conventional PCs and notebooks, also discussing iPAQs and Sharp Zauruses running Linux: super-handy for monitoring signal strength and discovering rogue access points. Once you have your toolset, you’ll walk through planning your attack, gaining access -- and the awful stuff that can be done once inside. By now, netadmins will be plenty motivated to fight back. The authors teach how, in detail. You’ll learn how to make the most of cryptography (not just WEP); provide effective user authentication, deploy higher-layer wireless VPNs, even implement a wireless IDS system. We needn’t remind you just how vulnerable many 802.11 networks still are, even now. Let’s just say, if you want to do something about it, you’ll find this book indispensable. Bill Camarda Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition. From the Publisher The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any wireless network. The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless 'citadels''including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more. Coverage includes: * Step-by-step walkthroughs and explanations of typical attacks * Building wireless hacking/auditing toolkit: detailed recommendations, ranging from discovery tools to chipsets and antennas * Wardriving: network mapping and site surveying * Potential weaknesses in current and emerging standards, including 802.11i, PPTP, and IPSec * Implementing strong, multilayered defenses * Wireless IDS: why attackers aren't as untraceable as they think * Wireless hacking and the law: what's legal, what isn't If you're a hacker or security auditor, this book will get you in. If you're a netadmin, sysadmin, consultant, or home user, it will keep everyone else out. Library Journal WarDriving-or moving around an area to map wireless access points-presents an opportunity for those interested in raising awareness of wireless connectivity and security vulnerabilities; an opening for those looking to contribute connectivity through deliberately opening access; and a security threat to those who fail to protect their networks-even though ethical WarDrivers point out that they eschew unauthorized network use. WarDriving teaches how to WarDrive, from necessary tools to useful software; each chapter ends with a summary, bullet points, and FAQ. Later chapters discuss how to attack and how to defend wireless networks, making this useful for readers wanting to protect their networks. The main focus, however, may find a narrow audience in most libraries; those seeking books on securing their network will want to supplement with more thorough guides, and those interested in WarDriving may already be conversant with the tools and ideas discussed. A supplemental purchase for larger libraries. Wi-Foo covers similar ground and discusses similar utilities, yet it goes much deeper into the nuts and bolts of both breaking into and defending wireless networks. Some more technical sections are balanced out by step-by-step explanations of security basics and patterns of attack. Extensive appendixes range from antenna irradiation patterns to war-chalking symbols to a penetration testing template. Wireless security is an ever-growing issue, which makes this thorough guide recommended for larger libraries. Copyright 2004 Reed Business Information. Slashdot.org Uses clear language and is easy to read. ... if you're network admin or security professional, this book is almost a must. It's a combo of Exploiting Software and Hacking Exposed with specialization on wireless LANs. Table of Contents Ch. 1 Real world wireless security 1 Ch. 2 Under siege 11 Ch. 3 Putting the gear together : 802.11 hardware 23 Ch. 4 Making the engine run : 802.11 drivers and utilities 43 Ch. 5 Learning to WarDrive : network mapping and site surveying 71 Ch. 6 Assembling the arsenal : tools of the trade 109 Ch. 7 Planning the attack 143 Ch. 8 Breaking through 155 Ch. 9 Looting and pillaging : the enemy inside 199 Ch. 10 Building the citadel : an introduction to wireless LAN defense 221 Ch. 11 Introduction to applied cryptography : symmetric ciphers 253 Ch. 12 Cryptographic data integrity protection, key exchange, and user authentication mechanisms 303 Ch. 13 The fortress gates : user authentication in wireless security 323 Ch. 14 Guarding the airwaves : deploying higher-layer wireless VPNs 383 Ch. 15 Counterintelligence : wireless IDS systems 435 App. A Decibel-watts conversion table 457 App. B 802.11 wireless equipment 461 App. C Antenna irradiation patterns 469 App. D Wireless utilities manpages 475 App. E Signal loss for obstacle types 503 App. F Warchalking signs 505 App. G Wireless penetration testing template 507 App. H Default SSIDs for several common 802.11 products 523 Product Details * ISBN: 0321202171 * ISBN-13: 9780321202178 * Format: Paperback, 555pp * Publisher: Pearson Education * Pub. Date: April 2004 Tracker: http://tpb.tracker.piratebayproxy.live:80/announce ------------------------------------------------------------------------------- Install Notes ------------------------------------------------------------------------------- Adobe Acrobat Reader ------------------------------------------------------------------------------- Generated with Cool NFO Creator - http://fly.to/coolbeans -------------------------------------------------------------------------------
File list not available. |
Thank u guys for downloading,pls continue seeding:-D ----KAKTOS???
our friend ~tqw~ always posts very good work
Well , i really respect the original uploaders thats the reason i let their identity disclosed in every possible way i can :-D
Works great, thanks!
Great job. Thanks!
thanx dude
2004 called - it wants it WEP info back....
thinks
Comments