Wireless Reconnaissance in Penetration Testing

  • ID: 1951684
  • Book
  • 226 Pages
  • Elsevier Science and Technology
1 of 4

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.

  • Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testing
  • Includes real-world case studies of actual penetration tests using radio profiling
  • Covers data leakage, frequency, attacks, and information gathering

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 4

Introduction Chapter 1: Why Radio Profiling? Chapter 2: Basic Radio Theory and Introduction to Radio Systems Chapter 3: Targets (Wireless Headsets, Guard Radios, Wireless Cameras, etc.) Chapter 4: Offsite Profiling Chapter 5: Offsite Profiling Case Study Chapter 6: Onsite Profiling Chapter 7: Onsite Profiling Case Study Chapter 8: How to Use the Information You Gather Chapter 9: Basic Overview of Equipment and How It Works Chapter 10: Case Study to Pull It All Together Chapter 11: New Technology and the Future of Radios in Penetration Testing Glossary

Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Neely, Matthew
Matthew Neely (CISSP, CTGA, GCIH, GCWN) is the Profiling Team Manager at SecureState, a Cleveland, Ohio-based security consulting company.
Hamerstone, Alex
Alex Hamerstone, CTGA - Security Consultant, Risk Management.
Sanyk, Chris
Chris Sanyk is a journeyman IT professional with over twelve years of experience with everything from desktop publishing and web design, to user support, to system administration, to software development. In his spare time, he blogs and develops video games at his website, csanyk.com.
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll