Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
E-Book/E-Doc
Author Neely, Matthew.

Title Wireless reconnaissance in penetration testing / Matthew Neely, Alex Hamerstone, Chris Sanyk.

Imprint Amsterdam : Elsevier/Syngress, 2013.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Summary In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling. Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testingIncludes real-world case studies of actual penetration tests using radio profiling. Covers data leakage, frequency, attacks, and information gathering.
Bibliography Includes bibliographical references and index.
Note Print version record.
Contents Forntmatter; Wireless Reconnaissance in Penetration Testing; Copyright; Dedication; Contents; Author Biography; Preface; 1 Why Radio Profiling?; Guard Radios, Wireless Headsets, Cordless Phones, Wireless Cameras, Building Control Systems; Case Study; 2 Basic Radio Theory and Introduction to Radio Systems; The Electromagnetic Spectrum; Terminology; Wavelength/Frequency Characteristics; How Materials Affect Radio Waves; Multipath; Regulatory Agencies; Applying the Science: Radio Technology Basics; Filters; Antennas; Antenna Theory; Signal Strength; Antenna Diagrams; Popular Types of Antennas.
Omnidirectional and Directional AntennasTypes of Omnidirectional Antennas; Types of Directional Antennas; Modulation; Analog Modulation; Common Analog Modulation Types; Digital Modulation; APCO P-25; Common Types of Spread Spectrum Modulation; Radio Systems; Simplex and Duplex; Simplex; Two-Frequency Simplex; Duplex; Repeaters; Media Access Control in Radio; CTCSS; Reconnaissance of CTCSS Equipped Radios; Digital Code System; Trunking; Trunked Radio Systems in Depth; Manufacturers of Trunked Radio Systems; Monitoring Trunked Radio Systems; Summary; Further Learning; 3 Targets.
Two-Way Radios Used for Verbal CommunicationDevices that Use Radio Frequencies; 4 Offsite Profiling; What is Offsite Profiling?; What to Look For; Using RadioReference.com for Offsite Profiling; Case Study: Offsite Profiling; Remediation and Lessons Learned; 5 Onsite Radio Profiling; Initial Onsite Reconnaissance; The Guard Force; Using a Frequency Counter; Visual Recon; Antennas; Search Common Frequency Ranges; Family Radio Service (FRS); General Mobile Radio Service (GMRS); Multi Use Radio Service (MURS); Dot Frequencies; Common Ranges; Common Business Ranges.
Common Cordless Phone and Headset RangesScanner Tips; Finding Trunked Systems; Case Study: Onsite Profiling; Remediation and Lessons Learned; Who is Guarding the Guards?; 6 How to Use the Information You Gather; Who is Guarding the Guards?; Monitoring Phone Calls; Monitoring Phone Calls; Wireless Cameras; Pan Tilt Zoom (PTZ) Cameras; Wireless Cameras; Pan Tilt Zoom (PTZ) Cameras; Common Scanner Controls and Features; Channels and Banks; 7 Basic Overview of Equipment and How it Works; Common Scanner Controls and Features; Channels and Banks; Squelch; Scan Button; Hold Button; Squelch.
Scan ButtonHold Button; Manual Button; Program; Lockout Button; Search; Manual Button; Program; Lockout Button; Search; Priority; Selecting a Scanner; Priority; Selecting a Scanner; Form Factor; Programmable Verse Pre-Programmed Scanners; Form Factor; Programmable Verse Pre-Programmed Scanners; Frequency Coverage; Frequency Coverage; Useful Scanner Feature; Number Pad; Useful Scanner Feature; Number Pad; Lighted Screens and Keyboards; Channel Spacing/Steps; Lighted Screens and Keyboards; Channel Spacing/Steps; Scan Speed; Modulation; Scan Speed; Modulation; APCO P-25 Decoding; Trunk Tracking.
Subject Electronic surveillance.
Penetration testing (Computer security)
Wireless communication systems -- Security measures.
Surveillance électronique.
Tests d'intrusion.
Transmission sans fil -- Sécurité -- Mesures.
TECHNOLOGY & ENGINEERING -- Electrical.
Electronic surveillance
Penetration testing (Computer security)
Wireless communication systems -- Security measures
Added Author Hamerstone, Alex.
Sanyk, Chris.
Other Form: Print version: Neely, Matthew. Wireless reconnaissance in penetration testing. Amsterdam : Elsevier/Syngress, 2013 9781597497312 (OCoLC)819104823
ISBN 9781597497329 (electronic bk.)
1597497320 (electronic bk.)
9781597497312
1597497312
Standard No. AU@ 000050608317
CHNEW 001010805
DEBBG BV042305249
DEBSZ 405345917
DEBSZ 43126001X
NZ1 15189144
DKDLA 820120-katalog:9910110259205765

 
    
Available items only