Chapter 4. Low tech wireless hacking
Information in this chapter
• Wireless 101: The Electromagnetic Spectrum
• 802.11 and Bluetooth Low Tech Hacks
• DoS and Availability
• Backdoors and Cracks
• Going Rogue
• Assault by Defaults
• Bypassing Specific Security Tools
It does no good to hermetically seal the windows in an organization if the doors are left wide open. But that is precisely what many organizations are doing today when they neglect to secure their wireless communications systems. Organizations habitually overlook the security of their wireless communications because they cannot see it. If they cannot see it, then they presume that no one else can either, and it is safe. However, that presumption cannot be farther from the truth. This chapter ...

Get Low Tech Hacking now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.