18 von 18 Kunden fanden die folgende Rezension hilfreich
- Veröffentlicht auf Amazon.com
From a beginner's perspective, this book is great. It offers a broad introduction to 802.11, Bluetooth, ZigBee, and DECT theory, as well as scanning, enumeration, and exploitation techniques. Additionally, the first chapter does a great job of recommending various 802.11 wireless devices. The book's teaching format is not OS-specific either, as the authors will show how to use different applications in different OSs (i.e., using Chanelyzer in Windows, or Kismet in Linux).
What you should expect from this book is an INTRODUCTION to wireless hacking. Like I stated earlier, this book offers broad coverage of various techniques. The authors touch on different subjects, but they do not delve waste-deep into the details of them. Don't expect a WHOLE chapter dedicated to instruction on the aircrack-ng suite, but do expect enough instruction on how to start and run it. There are whole books and websites dedicated to teaching many of the programs covered in this one text.
The authors do a very good job of teaching you how to defeat different forms of wireless security (SSID hiding, MAC filtering, WEP, WPA, etc.). For example, a majority of the text moves in a very logical pattern - first, you learn how to scan and identify a target wireless network. You're then taught how to defeat MAC filtering (if it is in place). Afterwards, you move on to encryption cracking. Finally, you're taught a bit of exploitation.
Don't think that reading this book will turn you into a "master Wi-Fi cracking Jedi" - this mindset will only set you up for disappointment. Think of this book as a "gateway," arming you with the knowledge needed to begin a new career/hobby/whatever. After reading, it's up to you to keep learning more about the different subjects this book touches on, and maybe even discovering some vulnerabilities and/or exploits on your own.
The following lists the chapters in the books, as well as any notes:
Part 1 - Hacking 802.11 Wireless Technology
1.) Introduction to 802.11 Hacking
** Very basic intro to 802.11 theory and devices. Recommended for beginners, as the device recommendations are on-point
2.) Scanning and Enumerating 802.11 Networks
3.) Attacking 802.11 Wireless Networks
** The "bread and butter" of the book, teaching you how to crack a WEP network with data/packets recovered from the previous chapter. Very nice "Bringing it all together" section at the end that gives you the "big picture" of defeating a wireless network with a hidden SSID, MAC filtering, and WEP encryption.
4.) Attacking WPA-Protected 802.11 Networks
** Nice chapter teaching you about the vulnerabilities of WPA (i.e., decrypting network traffic, cracking pre-shared keys, etc.)
Part II - Hacking 802.11 Clients
5.) Attack 802.11 Wireless Clients
** Nice coverage of Metasploit Framework, Evil DNSs, ARP spoofing, injection, and HTTPS cookie stealing
6.) Taking it All The Way: Bridging the Airgap from OS X
7.) Taking it All The Way: Bridging the Airgap from Windows
Part III - Hacking Additional Wireless Technologies
** The last 1/4 of the book was dedicated to the below-listed wireless technologies. Don't expect too much subject coverage on them, but then again, they are not as widely-deployed as Wi-Fi.
8.) Bluetooth Scanning and Reconnaissance
9.) Bluetooth Eavesdropping
10.) Attacking and Exploiting Bluetooth
11.) Hack ZigBee
12.) Hack DECT