Chapter 5

Wireless Mayhem with Python

Information in this chapter:

ent Sniffing Wireless Networks for Personal Information

ent Listening for Preferred Networks and Identifying Hidden Wireless Networks

ent Taking Control of Wireless Unmanned Aerial Vehicles

ent Identifying Firesheep in Use

 Stalking Bluetooth Radios

 Exploiting Bluetooth Vulnerabilities

Knowledge does ...

Get Violent Python now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.