O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Hacking Wireless Access Points

Book Description

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically.

The book demonstrates a variety of ways that these vulnerabilities can be—and have been—exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.

  • Explains how the wireless access points in common, everyday devices can expose us to hacks and threats
  • Teaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend data
  • Presents concrete examples and real-world guidance on how to protect against wireless access point attacks

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. About the Author
  7. Preface
  8. Acknowledgments
  9. Chapter 1. Wireless Technology Overview
    1. Abstract
    2. The Wonder of Wandering Signals
    3. Wireless Devices, Simplified
    4. The Telecommunications Standards Landscape
    5. Telecommunications Rules of Engagement
    6. Wireless Communications Rules of Engagement
    7. IEEE 802 Categories for Networking Standards
    8. Wireless LAN or Wi-Fi (802.11x)
    9. Wireless MAN or WiMAX (802.16)
    10. Wireless PAN (802.15)
    11. Radio Frequency Identification (RFID)
    12. Supervisory Control and Data Acquisition
    13. Where Do We Go From Here?
    14. Endnotes
  10. Chapter 2. Wireless Adoption
    1. Abstract
    2. Wireless Innovation and Adoption: Early Market Penetration
    3. Wireless Market Penetration: US Context
    4. Wireless Penetration Rates: Global Context
    5. Wireless Penetration Rates: Security Risk Context
    6. Hacking Goals: Strategies and Steps
    7. Endnotes
  11. Chapter 3. Blurred Edges: Fixed and Mobile Wireless Access Points
    1. Abstract
    2. The Hacking End Game
    3. Differentiation Between Fixed and Mobile WAPs
    4. Hacking Opportunities in Hybrid Networks and Communications Channels
    5. Challenges for Securing Hybrid Networks and Communications Channels
    6. Implications for Connections With Wired (Legacy) Networks and Systems
    7. Recommendations for Wireless/Hybrid Systems
    8. Importance of Context (Use Case Scenarios)
    9. Endnotes
  12. Chapter 4. Hacks Against Individuals
    1. Abstract
    2. Account Credentials Chain Attack
    3. Public Wi-Fi Hotspot Attack
    4. The Gullibles Travel Attack
    5. The Internet of Hacked Things Attack
    6. Endnotes
  13. Chapter 5. WAPs in Commercial and Industrial Contexts
    1. Abstract
    2. Overview
    3. Opportunities
    4. Commercial Space Taxonomy
    5. Endnotes
  14. Chapter 6. WAPs in Medical Environments
    1. Abstract
    2. Medical EHRs
    3. EHRs and Medical Devices
    4. Takeaways
    5. EHRs, Medical Devices, and ICS
    6. Takeaways
    7. Conclusion
    8. Endnotes
  15. Chapter 7. Hacking Wireless Access Points: Governmental Context
    1. Abstract
    2. Attack Chronology
    3. Takeaways
    4. Summary
    5. Endnotes
  16. Chapter 8. Noncivilian Government Context
    1. Abstract
    2. National Security
    3. Public Safety and Emergency Management
    4. Interoperability Challenges: People, Process, and Technology
    5. Representative Challenges: Policy and Procedure (AKA Process Engineering)
    6. Representative Challenges: Personnel (AKA Human Engineering)
    7. Representative Challenges: Technology (AKA Network and Design Engineering)
    8. The National Public Safety Broadband Network (AKA FirstNet)
    9. National Security: Real-World Attack Scenarios
    10. Takeaways
    11. Endnotes
  17. Chapter 9. Summary and Call to Action
    1. Abstract
    2. Thinking Like a Hacker: Aligning With Attack Methodologies
    3. Call to Action for Organizations
    4. Call to Action for Individuals
    5. Call to Action for Automated Systems
    6. The Importance of Thinking Earnestly
    7. Conclusion
    8. Endnotes
  18. Appendix
  19. Glossary
  20. Index