O'Reilly logo

Assessing Network Security by David LeBlanc, Kevin Lam, Ben Smith

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. War Dialing, War Driving, and Bluetooth Attacks

As the saying goes, there is more than one way to skin a cat, and in the digital security world this saying holds some definite truth. Attackers can often compromise an organization’s network without ever having to touch a perimeter firewall. This chapter is about some of the ways they do this—for example, by compromising a dial-up-enabled system, which can provide almost immediate access to internal networks. Dial-up access is a threat that tends to be overlooked or neglected by almost every organization, and in this chapter you’ll look at the dangers of doing so. You’ll also look at threats created by deploying wireless networks, and finally, you’ll look at issues that are specific ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required