Chapter 27. Wireless Security Auditing

 

“Friday night is “make-it”. After the meeting we slip away into the darkness, the cold night flogging us with a primal urgency. Tonight we hack Dallas.

Crouched in a tricked-out SUVebony with tinted windowsthe bizarre array of protruding antennas makes us a giant insect. We crawl along the Richardson Telecom Corridor, our faces deathly pallid in the glow of a laptop. It starts immediately, the walls of network security melting around us like ice. ...

Get Maximum Security, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.