How to Use the Information You Gather
As organizations become aware of security weaknesses, they tend to (at least attempt to) mitigate them. What this means for the penetration tester is that assessments that would have been fairly easy a few years ago are now far more challenging. Because radio traffic is an area where most organizations do not place a focus on security, it provides a great resource for gathering intelligence. This is not just theory; the authors have used information gathered by profiling radio traffic to increase the success of many penetration assessments, as shown by the included case studies.
Who is Guarding the Guards?
The information in this book is especially valuable when the target organization has a guard ...