Torrent Hash - Hash of all existing torrents
Search Files
Please, pay attention to the fact that you are about to download the torrent NOT from keygenplus.ru
keygenplus.ru is just a torrent search engine, no torrents are hosted here.
keygenplus.ru is just a torrent search engine, no torrents are hosted here.
SECRETS OF WIFI HACKING (KAKTOSa»a»a»)
Infohash:
40CB06168FED85CDFD89945FF0624865C3B79554
Type:
Other
Title:
SECRETS OF WIFI HACKING (KAKTOS☻☻☻)
Category:
Other/E-books
Uploaded:
2009-08-06 (by kaktosjaaz)
Description:
*******************************************************************************
Wi-Foo - The Secrets Of Wireless Hacking
*******************************************************************************
-------------------------------------------------------------------------------
General Information
-------------------------------------------------------------------------------
Type.................: Ebook
Part Size............: 7,057,172 bytes
-------------------------------------------------------------------------------
Post Information
-------------------------------------------------------------------------------
Posted by............: ~tqw~
-------------------------------------------------------------------------------
Release Notes
-------------------------------------------------------------------------------
[img]http://a1055.g.akamai.net/f/1055/1401/5h/images.barnesandnoble.com/images/1
0710000/10717288.jpg[/img]
There are plenty of wireless security books. This one’s seriously “hands-on.†It
was written by the leaders of one of the world’s top wireless security auditing
teams. Penetration testing is crucial to protecting yourself, and this book is
the source for mastering it. But it doesn’t just show you how to attack 802.11
networks -- it shows how to detect and defeat those attacks, too.
First, you’ll assemble the arsenal needed to probe wireless network security:
hardware, drivers, utilities, network mapping and site surveying tools, and so
forth. The authors offer knowledgeable advice on cards, chipsets, antennas,
amplifiers, cables, connectors, Linux drivers and wireless extensions, and of
course software tools. When it comes to the underlying hardware, they go beyond
conventional PCs and notebooks, also discussing iPAQs and Sharp Zauruses running
Linux: super-handy for monitoring signal strength and discovering rogue access
points.
Once you have your toolset, you’ll walk through planning your attack, gaining
access -- and the awful stuff that can be done once inside. By now, netadmins
will be plenty motivated to fight back. The authors teach how, in detail. You’ll
learn how to make the most of cryptography (not just WEP); provide effective
user authentication, deploy higher-layer wireless VPNs, even implement a
wireless IDS system.
We needn’t remind you just how vulnerable many 802.11 networks still are, even
now. Let’s just say, if you want to do something about it, you’ll find this book
indispensable. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His
15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks
for Dummies, Second Edition.
From the Publisher
The definitive guide to penetrating and defending wireless networks.
Straight from the field, this is the definitive guide to hacking wireless
networks. Authored by world-renowned wireless security auditors, this hands-on,
practical guide covers everything you need to attack -- or protect -- any
wireless network.
The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11
wireless networks and their attackers. One step at a time, you'll master the
attacker's entire arsenal of hardware and software tools: crucial knowledge for
crackers and auditors alike. Next, you'll learn systematic countermeasures for
building hardened wireless 'citadels''including cryptography-based techniques,
authentication, wireless VPNs, intrusion detection, and more.
Coverage includes:
* Step-by-step walkthroughs and explanations of typical attacks
* Building wireless hacking/auditing toolkit: detailed recommendations,
ranging from discovery tools to chipsets and antennas
* Wardriving: network mapping and site surveying
* Potential weaknesses in current and emerging standards, including 802.11i,
PPTP, and IPSec
* Implementing strong, multilayered defenses
* Wireless IDS: why attackers aren't as untraceable as they think
* Wireless hacking and the law: what's legal, what isn't
If you're a hacker or security auditor, this book will get you in. If you're a
netadmin, sysadmin, consultant, or home user, it will keep everyone else out.
Library Journal
WarDriving-or moving around an area to map wireless access points-presents an
opportunity for those interested in raising awareness of wireless connectivity
and security vulnerabilities; an opening for those looking to contribute
connectivity through deliberately opening access; and a security threat to those
who fail to protect their networks-even though ethical WarDrivers point out that
they eschew unauthorized network use. WarDriving teaches how to WarDrive, from
necessary tools to useful software; each chapter ends with a summary, bullet
points, and FAQ. Later chapters discuss how to attack and how to defend wireless
networks, making this useful for readers wanting to protect their networks. The
main focus, however, may find a narrow audience in most libraries; those seeking
books on securing their network will want to supplement with more thorough
guides, and those interested in WarDriving may already be conversant with the
tools and ideas discussed. A supplemental purchase for larger libraries. Wi-Foo
covers similar ground and discusses similar utilities, yet it goes much deeper
into the nuts and bolts of both breaking into and defending wireless networks.
Some more technical sections are balanced out by step-by-step explanations of
security basics and patterns of attack. Extensive appendixes range from antenna
irradiation patterns to war-chalking symbols to a penetration testing template.
Wireless security is an ever-growing issue, which makes this thorough guide
recommended for larger libraries. Copyright 2004 Reed Business Information.
Slashdot.org
Uses clear language and is easy to read. ... if you're network admin or security
professional, this book is almost a must. It's a combo of Exploiting Software
and Hacking Exposed with specialization on wireless LANs.
Table of Contents
Ch. 1 Real world wireless security 1
Ch. 2 Under siege 11
Ch. 3 Putting the gear together : 802.11 hardware 23
Ch. 4 Making the engine run : 802.11 drivers and utilities 43
Ch. 5 Learning to WarDrive : network mapping and site surveying 71
Ch. 6 Assembling the arsenal : tools of the trade 109
Ch. 7 Planning the attack 143
Ch. 8 Breaking through 155
Ch. 9 Looting and pillaging : the enemy inside 199
Ch. 10 Building the citadel : an introduction to wireless LAN defense 221
Ch. 11 Introduction to applied cryptography : symmetric ciphers 253
Ch. 12 Cryptographic data integrity protection, key exchange, and user
authentication mechanisms 303
Ch. 13 The fortress gates : user authentication in wireless security 323
Ch. 14 Guarding the airwaves : deploying higher-layer wireless VPNs 383
Ch. 15 Counterintelligence : wireless IDS systems 435
App. A Decibel-watts conversion table 457
App. B 802.11 wireless equipment 461
App. C Antenna irradiation patterns 469
App. D Wireless utilities manpages 475
App. E Signal loss for obstacle types 503
App. F Warchalking signs 505
App. G Wireless penetration testing template 507
App. H Default SSIDs for several common 802.11 products 523
Product Details
* ISBN: 0321202171
* ISBN-13: 9780321202178
* Format: Paperback, 555pp
* Publisher: Pearson Education
* Pub. Date: April 2004
Tracker: http://tpb.tracker.thepiratebay.se:80/announce
-------------------------------------------------------------------------------
Install Notes
-------------------------------------------------------------------------------
Adobe Acrobat Reader
-------------------------------------------------------------------------------
Generated with Cool NFO Creator - http://fly.to/coolbeans
-------------------------------------------------------------------------------
Tags:
- hacking
- wifi
- wifi hacking
- wireless hacking
- wireless network hacking
- network penetration
- wifii penetration
- unsecured network hack
- hacking into wifi networks
- hacking wifii networks
- hacking the easy way
Files count:
5
Size:
6.78 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969