Seven Deadliest Wireless Technologies Attacks - 1st Edition - ISBN: 9781597495417, 9781597495424

Seven Deadliest Wireless Technologies Attacks

1st Edition

Authors: Brad Haines
eBook ISBN: 9781597495424
Paperback ISBN: 9781597495417
Imprint: Syngress
Published Date: 25th March 2010
Page Count: 160
Tax/VAT will be calculated at check-out
19.95
15.99
26.95
Unavailable
File Compatibility per Device

PDF, EPUB, VSB (Vital Source):
PC, Apple Mac, iPhone, iPad, Android mobile devices.

Mobi:
Amazon Kindle eReader.

Institutional Access


Description

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.

This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Key Features

Attacks detailed in this book include:

  1. 802.11 Wireless—Infrastructure Attacks
  2. 802.11 Wireless—Client Attacks
  3. Bluetooth Attacks
  4. RFID Attacks
  5. Analog Wireless Device Attacks
  6. Bad Encryption
  7. Attacks on Cell Phones, PDAs and Other Hybrid Devices

Readership

Information security professionals of all levels; wireless device developers; recreational hackers

Table of Contents


Acknowledgments

About the Authors

Introduction

Chapter 1 802.11 Wireless – Infrastructure Attacks

How Wireless Networks Work

Case Study: TJX Corporation

Understanding WEP Cracking

How to Crack WEP

It Gets Better and Worse

WPA and WPA2 in a Nutshell

How to Crack WPA PSK and WPA2 PSK

Summary

Endnotes

Chapter 2 Wireless – Client Attacks

Public Hotspot Dangers

How Hotspots Work

Attacking Public Hotspots

The Crux of the Problem

Solutions

Injection Attacks

Replacing Java Script

Summary

Endnote

Chapter 3 Bluetooth Attacks

Bluetooth Technology

Hacking Bluetooth

Bluetooth Discovery

Connecting

Carwhisperer

Bluebug

Wholesale Sniffing

Bluetooth Viruses

Summary

Chapter 4 Radio Frequency Identification Attacks

RFID Basics

RFID Systems

RFID Risks

Physical Access Control

Proximity Cards

Cloning RFID

Minimizing the Risk

RFID Meets Crypto

Summary

Endnotes

Chapter 5 Analog Wireless Devices

Analog Devices

Digital versus Analog

Analog Security

Digital Security

Cordless and Wireless

Exploiting Analog Wireless

Audio Vulnerabilities

Scanner Selection

Headsets

Wireless Microphones

Video Devices

Defense

Summary

Chapter 6 Bad Encryption

History

Proper Encryption

Passports

Passport Summary

Speedpass

Advanced WPA and WPA2 Cracking

Summary

Endnote

Chapter 7 Cell Phones, Personal Digital Assistants, and Other Hybrid Devices

Hybrid Devices

History

Anatomy of the Attack

Jailbreaking

The Attacks

Future Attacks

Offensive Uses of Hybrid Devices

Anonymity

iPhone Summary

Android Security

Common Threats

Summary

Index








Details

No. of pages:
160
Language:
English
Copyright:
© Syngress 2010
Published:
Imprint:
Syngress
eBook ISBN:
9781597495424
Paperback ISBN:
9781597495417

About the Author

Brad Haines

Brad "RenderMan" Haines, Contributing Author to RFID Security (ISBN: 978-1-59749-047-4, Syngress) and Kismet Hacking (ISBN: 978-1-59749-117-4, Syngress), is chief researcher of Renderlab.net and co-refounder of "The Church of WiFi" wireless think tank. He currently operates his own consulting company in Edmonton, Alberta, Canada, providing wireless performance and security assessment services for a variety of clients both large and small.

A noted expert in the hacker community in the field of wireless security, he has spoken at many international conferences such as Black Hat and DEFCON and taught several classes on free wireless assessment tools. He has also contributed over time to many wireless security tools such as the Kismet wirelss sniffer and coWPAtty.

Affiliations and Expertise

Chief researcher of Renderlab.net

Reviews

"Seven Deadliest Wireless Technologies Attacks covers an array of wireless technologies and discusses the vulnerabilities and attacks associated with them, allowing the reader to fully understand not only HOW an attack works but WHY it works, using real-world examples supported by theory. This book is perfect for both penetration testers assessing these technologies and security managers who are tasked with managing the risks associated with them."--Tom Neaves, Senior Security Consultant at Verizon Business and Ph.D. Researcher at Royal Holloway, University of London

"I really, really liked this book. The chapters and the book are relatively short, but they are extremely to the point. The author has refrained from using overly technical language, and this fact makes this book perfect for novices and people who are forced to assume technical roles at home or at work. What I espeically liked is the large amount of real-world examples—they drive the point home and make for an interesting read. The text is peppered with notes, warnings and tips, and very enlightening 'Epic Fail' text boxes, where you can learn from other people's and companies' mistakes."--Help Net Security, October 04, 2010