Chapter 6

How to Use the Information You Gather

As organizations become aware of security weaknesses, they tend to (at least attempt to) mitigate them. What this means for the penetration tester is that assessments that would have been fairly easy a few years ago are now far more challenging. Because radio traffic is an area where most organizations do not place a focus on security, it provides a great resource for gathering intelligence. This is not just theory; the authors have used information gathered by profiling radio traffic to increase the success of many penetration assessments, as shown by the included case studies.

Who is Guarding the Guards?

The information in this book is especially valuable when the target organization has a guard ...

Get Wireless Reconnaissance in Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.