Chapter 5

Wireless Mayhem with Python

Information in this chapter:

ent Sniffing Wireless Networks for Personal Information

ent Listening for Preferred Networks and Identifying Hidden Wireless Networks

ent Taking Control of Wireless Unmanned Aerial Vehicles

ent Identifying Firesheep in Use

 Stalking Bluetooth Radios

 Exploiting Bluetooth Vulnerabilities

Knowledge does ...

Get Violent Python now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.