product
2079511Hacking Exposed Wireless, Third Editionhttps://www.gandhi.com.mx/hacking-exposed-wireless-third-edition-1/phttps://gandhi.vtexassets.com/arquivos/ids/1433513/f8a81ccd-27bf-417d-936b-5d06a7729a7f.jpg?v=6383381087762700009701348MXNMcGraw Hill LLCInStock/Ebooks/<h4>Exploit and defend against the latest wireless network attacks</h4><p>Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, youll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. <em>Hacking Exposed Wireless, Third Edition</em> features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave.</p><ul><li>Assemble a wireless attack toolkit and master the hackers weapons</li><li>Effectively scan and enumerate WiFi networks and client devices</li><li>Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite</li><li>Develop and launch client-side attacks using Ettercap and the WiFi Pineapple</li><li>Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS</li><li>Exploit holes in WPA and WPA2 personal and enterprise security schemes</li><li>Leverage rogue hotspots to deliver remote access software through fraudulent software updates</li><li>Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic</li><li>Capture and evaluate proprietary wireless technology with Software Defined Radio tools</li><li>Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices</li><li>Attack remote wireless networks using compromised Windows systems and built-in tools</li></ul>...2036019Hacking Exposed Wireless, Third Edition9701348https://www.gandhi.com.mx/hacking-exposed-wireless-third-edition-1/phttps://gandhi.vtexassets.com/arquivos/ids/1433513/f8a81ccd-27bf-417d-936b-5d06a7729a7f.jpg?v=638338108776270000InStockMXN99999DIEbook20159780071827621_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9780071827621_<h4>Exploit and defend against the latest wireless network attacks</h4><p>Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, youll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. <em>Hacking Exposed Wireless, Third Edition</em> features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave.</p><ul><li>Assemble a wireless attack toolkit and master the hackers weapons</li><li>Effectively scan and enumerate WiFi networks and client devices</li><li>Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite</li><li>Develop and launch client-side attacks using Ettercap and the WiFi Pineapple</li><li>Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS</li><li>Exploit holes in WPA and WPA2 personal and enterprise security schemes</li><li>Leverage rogue hotspots to deliver remote access software through fraudulent software updates</li><li>Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic</li><li>Capture and evaluate proprietary wireless technology with Software Defined Radio tools</li><li>Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices</li><li>Attack remote wireless networks using compromised Windows systems and built-in tools</li></ul>...9780071827621_McGraw Hill LLClibro_electonico_71736945-6356-377e-a91e-9033173862e9_9780071827621;9780071827621_9780071827621Johnny CacheInglésMéxicohttps://getbook.kobo.com/koboid-prod-public/mcgrawhill-epub-1a1593b4-7f15-4f3c-be90-13f671bdc001.epub2015-03-19T00:00:00+00:00McGraw Hill LLC