Hacking Wireless Networks For Dummies Paperback – Sep 2 2005
|New from||Used from|
Frequently Bought Together
Customers Who Viewed This Item Also Viewed
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
From the Back Cover
Become a cyber-hero know the common wireless weaknesses
"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program
Wireless networks are so convenient not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.
Discover how to
- Perform ethical hacks without compromising a system
- Combat denial of service and WEP attacks
- Understand how invaders think
- Recognize the effects of different hacks
- Protect against war drivers and rogue devices
About the Author
Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response.
Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
Most Helpful Customer Reviews on Amazon.com (beta)
I am astonished at how many positive reviews this horrible, stinky title has received ... how many friends do this guys have? In fact this has got to be one of the worst tech book I have ever read, a total waste of money and paper.
My advice is , avoid this book, and any other book form the same authors, like plague! You will learn NOTHING from them.
The authors go on and on babbling about how unsecure wireless networks are, and are nonetheless unable to clearly indicate you any technique to take advantage or to protect form this weakness. All you get (apart from the boring and repetitive author's ruminations) are a few screenshots of NetStumbler (hey man, I can see by myself what it looks like, teach me how to use it instead ..), one screenshot of Kismet running on a linux xterm and a list of some of its command options (come on do you think that a beginner would ever be able to figure out how to use a open source tool like Kismet all by himself?)
Ah we also get a little advertisement for a couple of non-free tools like AiroPeek ... like a beginner should spend money on that? And , wait, there is no tutorial or intro on those tools as well. Just the usual couple of screenshots to make the book look good if you flip through it at the bookstore.
Seriously, I know this is hard to believe, but this pathetic excuse for a book is just a series of boring trivialities
For example ... did you ever think about the fact that installing a non-authorized, non-encrypted access point in your office network might actually be a security risk? I am sure you didn't, but thanks to this beautiful book you know, as the author spends pages and pages rambling and babbling about this absurd topic!
Years ago the "For Dummies" series used to be the right choice if you needed a humorous, tutorial-like but solid intro to a 'foreign' technology, but now the title is not a joke anymore.
"Hacking Wireless Networks for Dummies".. true to its title!
Part 1 - Building the Foundation for Testing Wireless Networks: Introduction to Wireless Hacking; The Wireless Hacking Process; Implementing a Testing Methodology; Amassing Your War Chest
Part 2 - Getting Rolling with Common Wi-Fi Hacks: Human (in)Security; Containing the Airwaves; Hacking Wireless Clients; Discovering Default Settings; Wardriving
Part 3 - Advanced Wi-Fi Hacks: Still at War; Unauthorized Wireless Devices; Network Attacks; Denial-of-Service Attacks; Cracking Encryption; Authenticating Users
Part 4 - The Part of Tens: Ten Essential Tools for Hacking Wireless Networks; Ten Wireless Security-Testing Mistakes; Ten Tips for Following Up after Your Testing
Part 5 - Appendixes: Wireless Hacking Resources; Glossary of Acronyms
The target of this book is the security professional involved in testing networks to make them more secure. There's a heavy emphasis on "ethical hacking", or learning how to test a network's security without doing harm or using the information in a destructive fashion. A security consultant using this book would learn how to pre-plan a test, work with the company to make sure they were properly authorized, and then write up the results in a professional manner. That aspect of the book is impressive, and it helps to frame the information in the right light (not as a textbook on how to break into networks).
From a practical standpoint, this book excels. Each of the chapters covers the theory behind how or why a certain aspect of a wireless network would be vulnerable to an attack or exploit. Then the authors cover a number of open source and commercial software packages that are available to focus on that area. For instance, chapter 14 goes into why WEP encryption is flawed and how it can be broken with relatively little effort. It's followed by an explanation on how WPA addresses some of those issues. Finally you get coverage on available tools that are used to crack WEP and how you can use them to test your own network.
Highly practical and heavy on application... If you're a security professional with responsibility for your organization's wireless network, you need to read this book. And if you're a techno-geek with your own wireless network, you'll want to get this book to play around. I know I will be doing a little hacking at Chez Duffbert...
They touch on the advanced things but don't explain enough for you to really fully realize the potential of anything. It's sort of like going into a suntan studio with a 3/4 raincoat on. You might get something out of being there but not enough for it to really be useful.
This book is no exception.
While it does touch on things such as ARP poisoning and Net Stumbler as well as some other useful starting points, it leaves a lot to be desired when it comes to expanding enough to make things worthwhile. It's a good introduction book but if you're planning on doing some real penetrations or penetration testing there are better books suited for this.
I would call this one a pre-reference reference book. At best.
1. someone has broken into your network, gotten sensitive information or used your system to send out 500,000 SPAM e-mails, or
2. they haven't broken in yet, and you're being pro-active (good for you). The third possibility is that you're looking for or even thinking about going to work as a wireless security expert.
In all three of these cases, this is a good place to start. The book starts with a description of how to go attack your own system from the outside and thereby learning what an outside hacker could get by doing the same thing. Then when you find a hole in the security, it tells you how to secure it.
One nice thing about this book, like all 'For Dummies' books is the writing style. It tells you what you want to know without being either too simple or so overloaded with jargon that you can't make sense out of it. Another nice thing is that this book tells you specifically what software/hardware devices you need to get to accomplish the tasks, and it does so without concentrating on multi thousand dollar expenses.
Look for similar items by category
- Books > Computers & Technology > Certification Central
- Books > Computers & Technology > Internet & Social Media > Hacking
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > LAN
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > Networks
- Books > Computers & Technology > Security & Encryption > Wireless Security
- Books > Computers & Technology > Software > Introductory Guides
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > For Dummies Store > Computers & Internet > Certification
- Books > For Dummies Store > Computers & Internet > Digital Business & Culture > General
- Books > For Dummies Store > Computers & Internet > General
- Books > For Dummies Store > Computers & Internet > Networking > Networks, Protocols & API's > General
- Books > For Dummies Store > Computers & Internet > Networking > Networks, Protocols & API's > LAN
- Books > For Dummies Store > Computers & Internet > Networking > Networks, Protocols & API's > Network Security
- Books > For Dummies Store > Computers & Internet > Networking > Networks, Protocols & API's > Networks
- Books > For Dummies Store > Computers & Internet > Software > General
- Books > For Dummies Store > Computers & Internet > Web Development > Security & Encryption
- Books > Textbooks