Friday, October 9, 2015

WiFi Book Club Q4 2015

Welcome to the first edition of the WiFi Book Club! A series dedicated to getting the WLAN community reading & discussing the many books out there related to wireless. The goal is to read a book as part of the club once per quarter.

About one month before the end of each quarter I'll post a poll with a list of books to vote on. At the end of the quarter the votes will be tallied & the next book posted along with a review & discussion of the current book. Recommendations for books can be made via email, twitter, comments or carrier pigeon. While reading the book use the hashtag #WiFiBookClub to discuss on twitter.  In the interest of getting this off the ground quickly, I decided to fast forward the process & skip the voting for the first book. 

Without further ado I present the first book up for review, Hacking Wireless Exposed, Third Edition.

"Exploit and defend against the latest wireless network attacks

Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave.
  • Assemble a wireless attack toolkit and master the hacker’s weapons
  • Effectively scan and enumerate WiFi networks and client devices
  • Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite
  • Develop and launch client-side attacks using Ettercap and the WiFi Pineapple
  • Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS
  • Exploit holes in WPA and WPA2 personal and enterprise security schemes
  • Leverage rogue hotspots to deliver remote access software through fraudulent software updates
  • Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic
  • Capture and evaluate proprietary wireless technology with Software Defined Radio tools
  • Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices
  • Attack remote wireless networks using compromised Windows systems and built-in tools"

Now to the part you've all been waiting for, the unboxing!

If you purchase the paperback from Amazon it may arrive in a package similar to the above or it may not. The eBook version comes packaged in magic, so I was unable to obtain a photo.

After opening the package you will find the book inside & that's it.

I'm really looking forward to reading this book & sharing in the discussion with everyone. Don't forget to send me your recommendations for future WiFi Book Club reads.

1 comment:

  1. Thanks for sharing the info, keep up the good work going.... I really enjoyed exploring your site. good resource...