Read more
Informationen zum Autor Matthew Neely (CISSP, CTGA, GCIH, GCWN) is the Profiling Team Manager at SecureState, a Cleveland, Ohio-based security consulting company. Klappentext Includes real-world case studies of actual penetration test using radio profiling and covers data leakage, frequency, attacks and information gathering. "Despite the increasingly number of wireless devices, these security and information technology professionals contend that physical penetration tests for defending computer systems and companies neglect wireless traffic outside of Bluetooth and 802.11 devices and thus, often miss testing other wireless devices such as guard radios, wireless headsets, and cordless phones."--Reference and Research Book News, August 2013 Zusammenfassung Describes the ways that a penetration tester can gather and apply the information available from radio traffic. This book includes information from what equipment to use and how to find frequency information! to tips for reducing radio information leakage! to case studies describing how this information can be used to attack computer systems. Inhaltsverzeichnis Introduction 1. Why Radio Profiling? 2. Basic Radio Theory and Introduction to Radio Systems 3. Targets (Wireless Headsets, Guard Radios, Wireless Cameras, etc.) 4. Offsite Profiling 5. Offsite Profiling Case Study 6. Onsite Profiling 7. Onsite Profiling Case Study 8. How to Use the Information You Gather 9. Basic Overview of Equipment and How It Works 10. Case Study to Pull It All Together 11. New Technology and the Future of Radios in Penetration Testing Glossary
List of contents
Introduction 1. Why Radio Profiling? 2. Basic Radio Theory and Introduction to Radio Systems 3. Targets (Wireless Headsets, Guard Radios, Wireless Cameras, etc.) 4. Offsite Profiling 5. Offsite Profiling Case Study 6. Onsite Profiling 7. Onsite Profiling Case Study 8. How to Use the Information You Gather 9. Basic Overview of Equipment and How It Works 10. Case Study to Pull It All Together 11. New Technology and the Future of Radios in Penetration Testing Glossary
Report
"Despite the increasingly number of wireless devices, these security and information technology professionals contend that physical penetration tests for defending computer systems and companies neglect wireless traffic outside of Bluetooth and 802.11 devices and thus, often miss testing other wireless devices such as guard radios, wireless headsets, and cordless phones." --Reference and Research Book News, August 2013