3-for-1 Wireless Hacking Books
















Book Description
Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include client and network hub devices--up from about 4 million last year. This third book in the "HACKING" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g (Wi-Fi) projects teaching these millions of Wi-Fi users how to "mod" and "hack" Wi-Fi access points, network cards, and antennas to run various Linux distributions and create robust Wi-Fi networks.

Cahners predicts that wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless out of a total of 14.4 million home LAN nodes shipped. This book will show Wi-Fi enthusiasts and consumers of Wi-Fi LANs who want to modify their Wi-Fi hardware how to build and deploy homebrew Wi-Fi networks, both large and small.

* Wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless clients out of a total of 14.4 million home LAN nodes shipped.
* This book will use a series of detailed, inter-related projects to teach readers how to modify their Wi-Fi hardware to increase power and performance to match that of far more expensive enterprise networking products. Also features hacks to allow mobile laptop users to actively seek wireless connections everywhere they go!
* The authors are all members of the San Diego Wireless Users Group, which is famous for building some of the most innovative and powerful "home brew" Wi-Fi networks in the world.















Book Description
Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.

Discover how to:

  • Perform ethical hacks without compromising a system
  • Combat denial of service and WEP attacks
  • Understand how invaders think
  • Recognize the effects of different hacks
  • Protect against war drivers and rogue devices














Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.

  • Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
  • Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
  • Defend against WEP key brute-force, aircrack, and traffic injection hacks
  • Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
  • Prevent rogue AP and certificate authentication attacks
  • Perform packet injection from Linux
  • Launch DoS attacks using device driver-independent tools
  • Exploit wireless device drivers using the Metasploit 3.0 Framework
  • Identify and avoid malicious hotspots
  • Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

Table of contents

Part I: Overview
Chapter 1: Wireless Security Overview
Chapter 2: Radio Frequency
Part II: Hacking 802.11 Wireless Technology
Chapter 3: Introduction to 802.11
Chapter 4: 802.11 Discovery
Chapter 5: Scanning and Enumerating 802.11 Networks
Chapter 6: Attacking 802.11 Networks
Chapter 7: Attacking WPA-protected 802.11 Networks
Chapter 8: 802.11 Defense
Part III: Hacking Additional Wireless Technologies
Chapter 9: Hacking Hotspots
Chapter 10: The Potential Threat of Bluetooth
Chapter 11: Advanced Attacks

http://rapidshare.com/files/80917347/wireless_haking.rar

No comments: