Book description
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically.
The book demonstrates a variety of ways that these vulnerabilities can be—and have been—exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.
- Explains how the wireless access points in common, everyday devices can expose us to hacks and threats
- Teaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend data
- Presents concrete examples and real-world guidance on how to protect against wireless access point attacks
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- About the Author
- Preface
- Acknowledgments
-
Chapter 1. Wireless Technology Overview
- Abstract
- The Wonder of Wandering Signals
- Wireless Devices, Simplified
- The Telecommunications Standards Landscape
- Telecommunications Rules of Engagement
- Wireless Communications Rules of Engagement
- IEEE 802 Categories for Networking Standards
- Wireless LAN or Wi-Fi (802.11x)
- Wireless MAN or WiMAX (802.16)
- Wireless PAN (802.15)
- Radio Frequency Identification (RFID)
- Supervisory Control and Data Acquisition
- Where Do We Go From Here?
- Endnotes
- Chapter 2. Wireless Adoption
-
Chapter 3. Blurred Edges: Fixed and Mobile Wireless Access Points
- Abstract
- The Hacking End Game
- Differentiation Between Fixed and Mobile WAPs
- Hacking Opportunities in Hybrid Networks and Communications Channels
- Challenges for Securing Hybrid Networks and Communications Channels
- Implications for Connections With Wired (Legacy) Networks and Systems
- Recommendations for Wireless/Hybrid Systems
- Importance of Context (Use Case Scenarios)
- Endnotes
- Chapter 4. Hacks Against Individuals
- Chapter 5. WAPs in Commercial and Industrial Contexts
- Chapter 6. WAPs in Medical Environments
- Chapter 7. Hacking Wireless Access Points: Governmental Context
-
Chapter 8. Noncivilian Government Context
- Abstract
- National Security
- Public Safety and Emergency Management
- Interoperability Challenges: People, Process, and Technology
- Representative Challenges: Policy and Procedure (AKA Process Engineering)
- Representative Challenges: Personnel (AKA Human Engineering)
- Representative Challenges: Technology (AKA Network and Design Engineering)
- The National Public Safety Broadband Network (AKA FirstNet)
- National Security: Real-World Attack Scenarios
- Takeaways
- Endnotes
- Chapter 9. Summary and Call to Action
- Appendix
- Glossary
- Index
Product information
- Title: Hacking Wireless Access Points
- Author(s):
- Release date: December 2016
- Publisher(s): Syngress
- ISBN: 9780128092255
You might also like
video
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)
More Than 5 Hours of Video Instruction More than 5 hours of video instruction to help …
book
Hacking Exposed Wireless, Third Edition, 3rd Edition
Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network …
video
WiFi Hacking: Wireless Penetration Testing for Beginners
This course includes an overview of the various types of wireless (802.11) networks, available encryption security …
book
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues …