Hacking Wireless Networks for Dummies

Read Hacking Wireless Networks for Dummies for Free Online Page A

Book: Read Hacking Wireless Networks for Dummies for Free Online
Authors: Peter T. Kevin.; Davis Beaver
Tags: Team DDU
inspired by the original Hacking For Dummies book that Kevin authored and Peter performed the technical editing. Hacking For Dummies covered a broad range of security testing topics, but this book focuses specifically on 802.11-based wireless networks.
    The techniques we outline are based on information-security best practices, as well as various unwritten rules of engagement. This book covers the entire ethical-hacking process, from establishing your plan to carrying out the tests to following up and implementing countermeasures to ensure your wireless systems are secure.
    There are literally hundreds, if not thousands, of ways to hack wireless network systems such as (for openers) laptops and access points (APs). Rather than cover every possible vulnerability that may rear its head in your wireless network, we’re going to cover just the ones you should be most concerned about. The tools and techniques we describe in this book can help you secure wireless networks at home, in small-to-medium sized businesses (SMBs) including coffee shops, and even across large enterprise networks.
    How to Use This Book
    This book bases its approach on three standard ingredients of ethical-hacking wisdom:
    04_597302_intro.qxd 8/4/05 7:27 PM Page 3

Introduction
3
    ߜ Descriptions of various non-technical and technical hack attacks — and their detailed methodologies
    ߜ Access information to help you get hold of common freeware, open-source, and commercial security-testing tools
    ߜ Countermeasures to protect wireless networks against attacks Each chapter is as an individual reference on a specific ethical-hacking subject. You can refer to individual chapters that pertain to the type of testing you wish to perform, or you can read the book straight through.
    Before you start testing your wireless systems, it’s important to familiarize yourself with the information in Part I so you’re prepared for the tasks at hand. You’ve undoubtedly heard the saying, “If you fail to plan, you plan to fail.” Well, it applies especially to what we’re covering here.
    Foolish Assumptions
    Right off the bat, we make a few assumptions about you, the IT professional: ߜ You’re familiar with basic computer-, network-, wireless- and information-security-related concepts and terms.
    ߜ You have a wireless network to test that includes two wireless clients at a minimum but will likely include AP(s), wireless router(s), and more.
    ߜ You have a basic understanding of what hackers do.
    ߜ You have access to a computer and a wireless network on which to perform your tests.
    ߜ You have access to the Internet in order to obtain the various tools used in the ethical-hacking process.
    ߜ Finally, perhaps the most important assumption is that you’ve obtained permission to perform the hacking techniques contained in this book. If you haven’t, make sure you do — before you do anything we describe here.
    How This Book Is Organized
    This book is organized into five parts — three standard chapter parts, a Part of Tens, and a part with appendixes. These parts are modular, so you can jump around from one part to another to your heart’s content.
    04_597302_intro.qxd 8/4/05 7:27 PM Page 4
    4
    Hacking Wireless Networks For Dummies

Part I: Building the Foundation
for Testing Wireless Networks
    In Chapter 1, we talk about why you need to be concerned with wireless security — and outline various dangers that wireless networks face. We also talk about various wireless-testing tools, as well as hacks you can perform.
    Chapter 2 talks about planning your ethical-hacking journey, and Chapter 3
    talks about the specific methods you can use to perform your tests. Chapter 4
    finishes things off by outlining various testing tools you’ll need to hack your wireless systems.

Part II: Getting Rolling with
Common Wi-Fi Hacks
    This part begins with Chapter 5, in which we talk about various non-technical, people-related attacks, such as a lack of security awareness,

Similar Books

Hallowe'en Party

Agatha Christie

The Golden Bell

Autumn Dawn

Rimrunners

C. J. Cherryh

The Petty Demon

Fyodor Sologub

A Yuletide Treasure

Cynthia Bailey Pratt