Chapter 5
Wireless Mayhem with Python
Information in this chapter:
Sniffing Wireless Networks for Personal Information
Listening for Preferred Networks and Identifying Hidden Wireless Networks
Taking Control of Wireless Unmanned Aerial Vehicles
Identifying Firesheep in Use
Stalking Bluetooth Radios
Exploiting Bluetooth Vulnerabilities
Knowledge does ...
Get Violent Python now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.