Seven Deadliest Wireless Technologies Attacks

Seven Deadliest Wireless Technologies Attacks

1st Edition - March 13, 2010

Write a review

  • Author: Brad Haines
  • Paperback ISBN: 9781597495417
  • eBook ISBN: 9781597495424

Purchase options

Purchase options
DRM-free (EPub, Mobi, PDF)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order


Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Key Features

Attacks detailed in this book include:

  1. 802.11 Wireless—Infrastructure Attacks
  2. 802.11 Wireless—Client Attacks
  3. Bluetooth Attacks
  4. RFID Attacks
  5. Analog Wireless Device Attacks
  6. Bad Encryption
  7. Attacks on Cell Phones, PDAs and Other Hybrid Devices


Information security professionals of all levels; wireless device developers; recreational hackers

Table of Contents

  • Acknowledgments

    About the Authors


    Chapter 1 802.11 Wireless – Infrastructure Attacks

        How Wireless Networks Work

        Case Study: TJX Corporation

        Understanding WEP Cracking

        How to Crack WEP

        It Gets Better and Worse

        WPA and WPA2 in a Nutshell

        How to Crack WPA PSK and WPA2 PSK



    Chapter 2 Wireless – Client Attacks

        Public Hotspot Dangers

        How Hotspots Work

        Attacking Public Hotspots

        The Crux of the Problem


        Injection Attacks

             Replacing Java Script



    Chapter 3 Bluetooth Attacks

        Bluetooth Technology

        Hacking Bluetooth

             Bluetooth Discovery




        Wholesale Sniffing

        Bluetooth Viruses


    Chapter 4 Radio Frequency Identification Attacks

        RFID Basics

             RFID Systems

        RFID Risks

        Physical Access Control

             Proximity Cards

             Cloning RFID

             Minimizing the Risk

        RFID Meets Crypto



    Chapter 5 Analog Wireless Devices

        Analog Devices

        Digital versus Analog

             Analog Security

             Digital Security

        Cordless and Wireless

        Exploiting Analog Wireless

             Audio Vulnerabilities

        Scanner Selection


        Wireless Microphones

        Video Devices



    Chapter 6 Bad Encryption


        Proper Encryption


        Passport Summary


        Advanced WPA and WPA2 Cracking



    Chapter 7 Cell Phones, Personal Digital Assistants, and Other Hybrid Devices

        Hybrid Devices


        Anatomy of the Attack


        The Attacks

        Future Attacks

             Offensive Uses of Hybrid Devices


        iPhone Summary

             Android Security

             Common Threats



Product details

  • No. of pages: 160
  • Language: English
  • Copyright: © Syngress 2010
  • Published: March 13, 2010
  • Imprint: Syngress
  • Paperback ISBN: 9781597495417
  • eBook ISBN: 9781597495424

About the Author

Brad Haines

Brad "RenderMan" Haines, Contributing Author to RFID Security (ISBN: 978-1-59749-047-4, Syngress) and Kismet Hacking (ISBN: 978-1-59749-117-4, Syngress), is chief researcher of and co-refounder of "The Church of WiFi" wireless think tank. He currently operates his own consulting company in Edmonton, Alberta, Canada, providing wireless performance and security assessment services for a variety of clients both large and small.

A noted expert in the hacker community in the field of wireless security, he has spoken at many international conferences such as Black Hat and DEFCON and taught several classes on free wireless assessment tools. He has also contributed over time to many wireless security tools such as the Kismet wirelss sniffer and coWPAtty.

Affiliations and Expertise

Chief researcher of

Ratings and Reviews

Write a review

There are currently no reviews for "Seven Deadliest Wireless Technologies Attacks"