In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.
Rezensionen / Stimmen
"Despite the increasingly number of wireless devices, these security and information technology professionals contend that physical penetration tests for defending computer systems and companies neglect wireless traffic outside of Bluetooth and 802.11 devices and thus, often miss testing other wireless devices such as guard radios, wireless headsets, and cordless phones." --Reference and Research Book News, August 2013
Sprache
Verlagsort
Zielgruppe
Für Beruf und Forschung
Information Security Professionals, Penetration Testers, Risk Analysts, Security Operations, Wireless Network Engineers
Produkt-Hinweis
Broschur/Paperback
Klebebindung
Illustrationen
40 illustrations; Illustrations
Maße
Höhe: 234 mm
Breite: 192 mm
Dicke: 15 mm
Gewicht
ISBN-13
978-1-59749-731-2 (9781597497312)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Matthew Neely (CISSP, CTGA, GCIH, GCWN) is the Profiling Team Manager at SecureState, a Cleveland, Ohio-based security consulting company. Alex Hamerstone, CTGA - Security Consultant, Risk Management. Chris Sanyk is a journeyman IT professional with over twelve years of experience with everything from desktop publishing and web design, to user support, to system administration, to software development. In his spare time, he blogs and develops video games at his website, csanyk.com.
Autor*in
Matthew Neely (CISSP, CTGA, GCIH, GCWN) is the Profiling Team Manager at SecureState, a Cleveland, Ohio-based security consulting company.
Alex Hamerstone, CTGA - Security Consultant, Risk Management.
Introduction
1. Why Radio Profiling?
2. Basic Radio Theory and Introduction to Radio Systems
3. Targets (Wireless Headsets, Guard Radios, Wireless Cameras, etc.)
4. Offsite Profiling
5. Offsite Profiling Case Study
6. Onsite Profiling
7. Onsite Profiling Case Study
8. How to Use the Information You Gather
9. Basic Overview of Equipment and How It Works
10. Case Study to Pull It All Together
11. New Technology and the Future of Radios in Penetration Testing
Glossary