pull down to refresh

Part I: Building the Foundation for Ethical Hacking .......7 Chapter 1: Introduction to Ethical Hacking ...................................................................9 Chapter 2: Cracking the Hacker Mindset ......................................................................21 Chapter 3: Developing Your Ethical Hacking Plan .......................................................29 Chapter 4: Hacking Methodology ..................................................................................39 Part II: Putting Ethical Hacking in Motion ..................53 Chapter 5: Social Engineering ........................................................................................55 Chapter 6: Physical Security ..........................................................................................69 Chapter 7: Passwords .....................................................................................................79 Part III: Network Hacking ........................................103 Chapter 8: War Dialing ..................................................................................................105 Chapter 9: Network Infrastructure ..............................................................................117 Chapter 10: Wireless LANs ...........................................................................................147 Part IV: Operating System Hacking ..........................165 Chapter 11: Windows ....................................................................................................167 Chapter 12: Linux ..........................................................................................................193 Chapter 13: Novell NetWare .........................................................................................215 Part V: Application Hacking .....................................235 Chapter 14: Malware .....................................................................................................237 Chapter 15: Messaging Systems ..................................................................................257 Chapter 16: Web Applications .....................................................................................279 Part VI: Ethical Hacking Aftermath ..........................297 Chapter 17: Reporting Your Results ............................................................................299 Chapter 18: Plugging Security Holes ...........................................................................305 Chapter 19: Managing Security Changes ....................................................................311 11 Part VII: The Part of Tens .........................................317 Chapter 20: Ten Tips for Getting Upper Management Buy-In ..................................319 Chapter 21: Ten Deadly Mistakes .................
Foreword ..................................................................xvii Introduction ................................................................1 Part I: Building the Foundation for Testing Wireless Networks .......................................7 Chapter 1: Introduction to Wireless Hacking .................................................................9 Chapter 2: The Wireless Hacking Process ....................................................................19 Chapter 3: Implementing a Testing Methodology .......................................................31 Chapter 4: Amassing Your War Chest ...........................................................................43 Part II: Getting Rolling with Common Wi-Fi Hacks .......65 Chapter 5: Human (In)Security ......................................................................................67 Chapter 6: Containing the Airwaves .............................................................................81 Chapter 7: Hacking Wireless Clients .............................................................................97 Chapter 8: Discovering Default Settings .....................................................................113 Chapter 9: Wardriving ...................................................................................................131 Part III: Advanced Wi-Fi Hacks ................................153 Chapter 10: Still at War .................................................................................................155 Chapter 11: Unauthorized Wireless Devices ..............................................................177 Chapter 12: Network Attacks .......................................................................................195 Chapter 13: Denial-of-Service Attacks .........................................................................225 Chapter 14: Cracking Encryption ................................................................................255 Chapter 15: Authenticating Users ...............................................................................281 Part IV: The Part of Tens ..........................................301 Chapter 16: Ten Essential Tools for Hacking Wireless Networks ............................303 Chapter 17: Ten Wireless Security-Testing Mistakes ................................................307 Chapter 18: Ten Tips for Following Up after Your Testing .......................................321 Part V: Appendixes ..................................................325 Appendix A: Wireless Hacking Resources ..................................................................327 Appendix B: Glossary of Acronyms ............................................................................341 Index .......................................................................347 6th
this territory is moderated