WarDriving and Wireless Penetration Testing book cover

WarDriving and Wireless Penetration Testing

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.

Audience
The target audience for this book is information security professionals who are required to perform WarDriving and wireless penetration testing as part of their duties as well as hobbyists that are interested in learning the tactics used by professional penetration testers when WarDriving and performing wireless penetration tests. Additionally, both business and home users that are concerned about the security of their wireless networks will find a wealth of knowledge in how to secure their networks.

Paperback, 446 Pages

Published: November 2006

Imprint: Syngress

ISBN: 978-1-59749-111-2

Contents

  • 1. Introduction to WarDriving and Penetration Testing 2. Understanding Antenna Theory 3. WarDriving with Handheld Devices and Direction Finding 4. Performing Penetration Testing on Wireless Networks using Linux 5. Performing Penetration Testing on Wireless Networks using OS X 6. Performing Penetration Testing on Wireless Networks using a Bootable CD Distribution 7. Mapping WarDrives 8. Using Man in the Middle Attacks to Your Advantage 9. Using Custom Firmware

Advertisement

advert image