Chapter 4. Low tech wireless hacking
Information in this chapter
• Wireless 101: The Electromagnetic Spectrum
• 802.11 and Bluetooth Low Tech Hacks
• DoS and Availability
• Backdoors and Cracks
• Going Rogue
• Assault by Defaults
• Bypassing Specific Security Tools
It does no good to hermetically seal the windows in an organization if the doors are left wide open. But that is precisely what many organizations are doing today when they neglect to secure their wireless communications systems. Organizations habitually overlook the security of their wireless communications because they cannot see it. If they cannot see it, then they presume that no one else can either, and it is safe. However, that presumption cannot be farther from the truth. This chapter ...

Get Low Tech Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.