O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Seven Deadliest Wireless Technologies Attacks

Book Description

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.

This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Attacks detailed in this book include:

  1. 802.11 Wireless—Infrastructure Attacks
  2. 802.11 Wireless—Client Attacks
  3. Bluetooth Attacks
  4. RFID Attacks
  5. Analog Wireless Device Attacks
  6. Bad Encryption
  7. Attacks on Cell Phones, PDAs and Other Hybrid Devices

Table of Contents

  1. Cover image
  2. Title page
  3. Copyright
  4. Acknowledgments
  5. About the Authors
    1. Technical Editor
  6. Introduction
    1. Book Overview and Key Learning Points
    2. Book Audience
    3. How This Book is Organized
    4. Conclusion
  7. CHAPTER 1. 802.11 Wireless – Infrastructure Attacks
    1. Publisher Summary
    2. How Wireless Networks Work
    3. Case Study: TJX Corporation
    4. Understanding WEP Cracking
    5. How to Crack WEP
    6. It Gets Better and Worse
    7. WPA and WPA2 in a Nutshell
    8. How to Crack WPA PSK and WPA2 PSK
    9. Summary
    10. Endnotes
  8. CHAPTER 2. Wireless – Client Attacks
    1. Publisher Summary
    2. Public Hotspot Dangers
    3. How Hotspots Work
    4. Attacking Public Hotspots
    5. The Crux of the Problem
    6. Solutions
    7. Injection Attacks
    8. Summary
    9. Endnote
  9. CHAPTER 3. Bluetooth Attacks
    1. Publisher Summary
    2. Bluetooth Technology
    3. Hacking Bluetooth
    4. Connecting
    5. Wholesale Sniffing
    6. Bluetooth Viruses
    7. Summary
  10. CHAPTER 4. Radio Frequency Identification Attacks
    1. Publisher Summary
    2. RFID Basics
    3. RFID Risks
    4. Physical Access Control
    5. RFID Meets Crypto
    6. Summary
    7. Endnotes
  11. CHAPTER 5. Analog Wireless Devices
    1. Publisher Summary
    2. Analog Devices
    3. Digital Versus Analog
    4. Cordless and Wireless
    5. Exploiting Analog Wireless
    6. Scanner Selection
    7. Wireless Microphones
    8. Video Devices
    9. Defense
    10. Summary
  12. CHAPTER 6. Bad Encryption
    1. Publisher Summary
    2. History
    3. Proper Encryption
    4. Passports
    5. Passport Summary
    6. Speedpass
    7. Advanced WPA and WPA2 Cracking
    8. Summary
    9. Endnote
  13. CHAPTER 7. Cell Phones, Personal Digital Assistants, and Other Hybrid Devices
    1. Publisher Summary
    2. Hybrid Devices
    3. History
    4. Anatomy of the Attack
    5. The Attacks
    6. Future Attacks
    7. iPhone Summary
    8. Summary
  14. Index