In Chapter 1, we talk about why you need to be concerned with wireless security — and outline various dangers that wireless networks face. We also talk about various wireless-testing tools, as well as hacks you can perform. Chapter 2 talks about planning your ethical-hacking journey, and Chapter 3 talks about the specific methods you can use to perform your tests.
Chapter 4 finishes things off by outlining various testing tools you’ll need to hack your wireless systems This part begins with Chapter 5, in which we talk about various non-technical, people-related attacks, such as a lack of security awareness, installing systems with default settings, and social engineering. Chapter 6 talks about various physical security ailments that can leave your network open to attack.
Chapter 7 covers common vulnerabilities found in wireless-client systems associated with wireless PC Cards, operating system weaknesses, and personal firewalls — any of which can make or break the security of your wireless network. In Chapter 8, we dig a little deeper into the “people problems” covered in Chapter 5 — in particular, what can happen when people don’t change the default settings (arch).
We talk about SSIDs, passwords, IP addresses, and more, so be sure to check out this vital information on an often-overlooked wireless weakness. In Chapter 9, we cover the basics of war driving including how to use stumbling software and a GPS system to map out your wireless network. We’ll not only cover the tools and techniques, but also what you can do about it — and that includes doing it ethically before somebody does it maliciously.
The filmy zilla is one of the best websites where you can download all categories’ latest movies.