Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER SUMMARY

There are numerous open source and commercial tools to help administrators perform wireless audits. Discovery tools such as AirMagnet, Acrylic, or Xirrus Wi-Fi Inspector help verify what is actually in place (as opposed to what’s on a diagram), showing the network’s true status. The next stage is to check the network for known vulnerabilities by using vulnerability scanners such as Nessus. This software checks network clients against a national database of thousands of contemporary known OS and application vulnerabilities.

After vulnerabilities have been identified and removed, it’s time to bring out the big guns: pentesters. Pentesters are fully developed frameworks of tools that enable auditors not only to verify vulnerabilities ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733