Book description
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.
- Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testing
- Includes real-world case studies of actual penetration tests using radio profiling
- Covers data leakage, frequency, attacks, and information gathering
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Author Biography
- Preface
- Chapter 1. Why Radio Profiling?
- Chapter 2. Basic Radio Theory and Introduction to Radio Systems
- Chapter 3. Targets
- Chapter 4. Offsite Profiling
- Chapter 5. Onsite Radio Profiling
- Chapter 6. How to Use the Information You Gather
- Chapter 7. Basic Overview of Equipment and How it Works
- Chapter 8. The House Doesn’t Always Win: A Wireless Reconnaissance Case Study
- Chapter 9. New Technology
- Glossary
- Index
Product information
- Title: Wireless Reconnaissance in Penetration Testing
- Author(s):
- Release date: December 2012
- Publisher(s): Syngress
- ISBN: 9781597497329
You might also like
book
Cyber Reconnaissance, Surveillance and Defense
At a time when online surveillance and cybercrime techniques are widespread, and are being used by …
book
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This …
book
Google Hacking for Penetration Testers, 3rd Edition
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, …
book
Penetration Testing with Raspberry Pi
Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry …