Seven Deadliest Wireless Technologies Attacks
- 1st Edition - March 13, 2010
- Author: Brad Haines
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 5 4 1 - 7
- eBook ISBN:9 7 8 - 1 - 5 9 7 4 9 - 5 4 2 - 4
Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteSeven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.
This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.
Attacks detailed in this book include:
- 802.11 Wireless—Infrastructure Attacks
- 802.11 Wireless—Client Attacks
- Bluetooth Attacks
- RFID Attacks
- Analog Wireless Device Attacks
- Bad Encryption
- Attacks on Cell Phones, PDAs and Other Hybrid Devices
Information security professionals of all levels; wireless device developers; recreational hackers
Acknowledgments
About the Authors
Introduction
Chapter 1 802.11 Wireless – Infrastructure Attacks
How Wireless Networks Work
Case Study: TJX Corporation
Understanding WEP Cracking
How to Crack WEP
It Gets Better and Worse
WPA and WPA2 in a Nutshell
How to Crack WPA PSK and WPA2 PSK
Summary
Endnotes
Chapter 2 Wireless – Client Attacks
Public Hotspot Dangers
How Hotspots Work
Attacking Public Hotspots
The Crux of the Problem
Solutions
Injection Attacks
Replacing Java Script
Summary
Endnote
Chapter 3 Bluetooth Attacks
Bluetooth Technology
Hacking Bluetooth
Bluetooth Discovery
Connecting
Carwhisperer
Bluebug
Wholesale Sniffing
Bluetooth Viruses
Summary
Chapter 4 Radio Frequency Identification Attacks
RFID Basics
RFID Systems
RFID Risks
Physical Access Control
Proximity Cards
Cloning RFID
Minimizing the Risk
RFID Meets Crypto
Summary
Endnotes
Chapter 5 Analog Wireless Devices
Analog Devices
Digital versus Analog
Analog Security
Digital Security
Cordless and Wireless
Exploiting Analog Wireless
Audio Vulnerabilities
Scanner Selection
Headsets
Wireless Microphones
Video Devices
Defense
Summary
Chapter 6 Bad Encryption
History
Proper Encryption
Passports
Passport Summary
Speedpass
Advanced WPA and WPA2 Cracking
Summary
Endnote
Chapter 7 Cell Phones, Personal Digital Assistants, and Other Hybrid Devices
Hybrid Devices
History
Anatomy of the Attack
Jailbreaking
The Attacks
Future Attacks
Offensive Uses of Hybrid Devices
Anonymity
iPhone Summary
Android Security
Common Threats
Summary
Index
- No. of pages: 160
- Language: English
- Edition: 1
- Published: March 13, 2010
- Imprint: Syngress
- Paperback ISBN: 9781597495417
- eBook ISBN: 9781597495424
BH
Brad Haines
A noted expert in the hacker community in the field of wireless security, he has spoken at many international conferences such as Black Hat and DEFCON and taught several classes on free wireless assessment tools. He has also contributed over time to many wireless security tools such as the Kismet wirelss sniffer and coWPAtty.