Part I: Building the Foundation for Ethical Hacking .......7
Chapter 1: Introduction to Ethical Hacking ...................................................................9
Chapter 2: Cracking the Hacker Mindset ......................................................................21
Chapter 3: Developing Your Ethical Hacking Plan .......................................................29
Chapter 4: Hacking Methodology ..................................................................................39
Part II: Putting Ethical Hacking in Motion ..................53
Chapter 5: Social Engineering ........................................................................................55
Chapter 6: Physical Security ..........................................................................................69
Chapter 7: Passwords .....................................................................................................79
Part III: Network Hacking ........................................103
Chapter 8: War Dialing ..................................................................................................105
Chapter 9: Network Infrastructure ..............................................................................117
Chapter 10: Wireless LANs ...........................................................................................147
Part IV: Operating System Hacking ..........................165
Chapter 11: Windows ....................................................................................................167
Chapter 12: Linux ..........................................................................................................193
Chapter 13: Novell NetWare .........................................................................................215
Part V: Application Hacking .....................................235
Chapter 14: Malware .....................................................................................................237
Chapter 15: Messaging Systems ..................................................................................257
Chapter 16: Web Applications .....................................................................................279
Part VI: Ethical Hacking Aftermath ..........................297
Chapter 17: Reporting Your Results ............................................................................299
Chapter 18: Plugging Security Holes ...........................................................................305
Chapter 19: Managing Security Changes ....................................................................311
11
Part VII: The Part of Tens .........................................317
Chapter 20: Ten Tips for Getting Upper Management Buy-In ..................................319
Chapter 21: Ten Deadly Mistakes .................
Foreword ..................................................................xvii
Introduction ................................................................1
Part I: Building the Foundation
for Testing Wireless Networks .......................................7
Chapter 1: Introduction to Wireless Hacking .................................................................9
Chapter 2: The Wireless Hacking Process ....................................................................19
Chapter 3: Implementing a Testing Methodology .......................................................31
Chapter 4: Amassing Your War Chest ...........................................................................43
Part II: Getting Rolling with Common Wi-Fi Hacks .......65
Chapter 5: Human (In)Security ......................................................................................67
Chapter 6: Containing the Airwaves .............................................................................81
Chapter 7: Hacking Wireless Clients .............................................................................97
Chapter 8: Discovering Default Settings .....................................................................113
Chapter 9: Wardriving ...................................................................................................131
Part III: Advanced Wi-Fi Hacks ................................153
Chapter 10: Still at War .................................................................................................155
Chapter 11: Unauthorized Wireless Devices ..............................................................177
Chapter 12: Network Attacks .......................................................................................195
Chapter 13: Denial-of-Service Attacks .........................................................................225
Chapter 14: Cracking Encryption ................................................................................255
Chapter 15: Authenticating Users ...............................................................................281
Part IV: The Part of Tens ..........................................301
Chapter 16: Ten Essential Tools for Hacking Wireless Networks ............................303
Chapter 17: Ten Wireless Security-Testing Mistakes ................................................307
Chapter 18: Ten Tips for Following Up after Your Testing .......................................321
Part V: Appendixes ..................................................325
Appendix A: Wireless Hacking Resources ..................................................................327
Appendix B: Glossary of Acronyms ............................................................................341
Index .......................................................................347
6th
nostr
: https://njump.me/nevent1qvzqqqqqqypzqnlpfmegjd95py7hr4p63j0fa3p2ksjrl6ll7wz8p0l0qh63nyhvqy2hwumn8ghj7mn0wd68ytndv9jxxmewd4jj7qguwaehxw309aex2mrp0yh856r0w4eksetw8yerjtnrdakj7qpqqx7a5v39wt4c0end47hdud8h9r3n88gva0rjx7egmgmgddmm6aas9fqkrs