Hacking Wireless Networks For Dummies

About the Authors
Kevin Beaver is founder and information security advisor with Principle
Logic, LLC, an Atlanta-based information-security services firm. He has over
17 years of experience in the IT industry and specializes in information
security assessments for those who take security seriously — and incident
response for those who don’t. Before starting his own information-security
services business, Kevin served in various information-technology and security
roles for several healthcare, e-commerce, financial, and educational
institutions.

Kevin is author of Hacking For Dummies as well as the e-book The Definitive
Guide to Email Management and Security (Realtimepublishers.com). In addition,
Kevin co-authored The Practical Guide to HIPAA Privacy and Security
Compliance (Auerbach Publications). He was also a contributing author and
editor of Healthcare Information Systems, 2nd ed., (Auerbach Publications),
and technical editor of Network Security For Dummies.

Kevin is a regular columnist and information-security expert for SearchSecurity.
com, SearchWindowsSecurity.com, SearchNetworking.com, SearchExchange.
com, and SearchSmallBizIT.com. He also serves as a contributing editor
for HCPro’s Briefings on HIPAA newsletter and is a Security Clinic Expert
for ITsecurity.com. In addition, Kevin’s information-security work has
been published in Information Security Magazine, SecurityFocus.com,
and Computerworld.com. Kevin is an information-security instructor for
the Southeast Cybercrime Institute, and frequently speaks on information
security at various conferences for CSI, TechTarget, IIA, SecureWorld Expo,
and the Cybercrime Summit.

Kevin earned his bachelor’s degree in Computer Engineering Technology from
Southern Polytechnic State University and his master’s degree in Management
of Technology from Georgia Tech. He also holds MCSE, Master CNE, and IT
Project+ certifications. Kevin can be reached at [email protected]
Peter T. Davis (CISA, CMA, CISSP, CWNA, CCNA, CMC, CISM) founded Peter
Davis+Associates (a very original name) as a firm specializing in the security,
audit, and control of information. A 30-year information-systems veteran,
Mr. Davis’s career includes positions as programmer, systems analyst, security
administrator, security planner, information-systems auditor, and consultant.

Peter is also the founder (and past President) of the Toronto ISSA chapter,
past Recording Secretary of the ISSA’s International Board, and past Computer
Security Institute Advisory Committee member. Mr. Davis has written or
co-written numerous articles and 10 books, including Wireless Networks For
Dummies and Securing and Controlling Cisco Routers. In addition, Peter was

Related Articles

Hacking Wireless Networks for Dummies

Become a cyber-hero – know the common wireless weaknesses
“Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.”
–Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient – not only for you, but also for those nefarious types who’d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network’s armor.

Discover how to:

Perform ethical hacks without compromising a system
Combat denial of service and WEP attacks
Understand how invaders think
Recognize the effects of different hacks
Protect against war drivers and rogue devices

Hacking for Dummies

Synopsis
“Ethical hacking” is the process of entering into a hacker’s mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities; shows readers how to approach their system security from the hacker’s perspective and perform nondestructive penetration testing; helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them; and guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.

While you re reading this, a hacker could be prying and spying his way into your company s IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker s mindset and take security precautions to help you avoid a hack attack. It outlines computer hacker tricks and techniques you can use to assess the security of your own information systems, find security vulnerabilities, and fix them before malicious and criminal hackers can exploit them. It covers:
– Hacking methodology and researching public information to see what a hacker can quickly learn about your operations
– Social engineering (how hackers manipulate employees to gain information and access), physical security, and password vulnerabilities
– Network infrastructure, including port scanners, SNMP scanning, banner grabbing, scanning, and wireless LAN vulnerabilities
– Operating systems, including Windows, Linux, and Novell NetWare
– Application hacking, including malware (Trojan horses, viruses, worms, rootkits, logic bombs, and more), e–mail and instant messaging, and Web applications
– Tests, tools (commercial, shareware, and freeware), and techniques that offer the most bang for your ethical hacking buck

With this guide you can develop and implement a comprehensive security assessment plan, get essential support from management, test your system for vulnerabilities, take countermeasures, and protect your network infrastructure. You discover how to beat hackers at their own game, with:

– A hacking toolkit, including War dialing software, password cracking software, network scanning software, network vulnerability assessment software, a network analyzer, a Web application assessment tool, and more
– All kinds of countermeasures and ways to plug security holes
– A list of more than 100 security sites, tools, and resources

Ethical hacking helps you fight hacking with hacking, pinpoint security flaws within your systems, and implement countermeasures. Complete with tons of screen shots, step–by–step instructions for some countermeasures, and actual case studies from IT security professionals, this is an invaluable guide, whether you re an Internet security professional, part of a penetration–testing team, or in charge of IT security for a large or small business.

Computer Viruses for Dummies

Computer viruses–just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:

Understand the risks and analyze your PC’s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it’s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you’re surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don’t protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

Wireless Networks for Dummies

You’ve probably heard the expression, “It’s time to cut the cord.” Well, it may be time to “cut the cables” at your office and free yourself from your desk and computer. Wireless networks are the waves of the future—literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can:

Remain connected to the office in airports and hotels
Access the Internet and other network resources in the lunchroom, conference room, or anywhere there’s an access point
Use your PDA or laptop to query your database from the warehouse or the boardroom
Check e-mail wirelessly when you’re on the road
Get rid of the cable clutter in your office

Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm and an internationally known leader of security seminars. Peter Davis is founder of a firm specializing in the security, audit, and control of information. Together, they cut through the cables, clutter, and confusion and help you:

Get off to a quick start and get mobile with IrDA (Infrared Data Association) and Bluetooth
Perform a site survey and select the right standard, mode, access point, channel and antenna
Check online to verify degree of interoperability of devices from various vendors
Install clients and set up roaming
Combat security threats such as war driving, jamming, hijacking, and man-in-the-middle attacks
Implement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network)
Set up multiple access points to form a larger wireless network

Complete with suggestions of places to get connected, Web sites where you can get more information, tools you can use to monitor and improve security, and more, Wireless Networks For Dummies helps you pull the plug and go wireless!

Wireless Networks for Dummies

you’ve probably heard the expression, “It’s time to cut the cord.” Well, it may be time to “cut the cables” at your office and free yourself from your desk and computer. Wireless networks are the waves of the future—literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can:
Remain connected to the office in airports and hotels
Access the Internet and other network resources in the lunchroom, conference room, or anywhere there’s an access point
Use your PDA or laptop to query your database from the warehouse or the boardroom
Check e-mail wirelessly when you’re on the road
Get rid of the cable clutter in your office

Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm and an internationally known leader of security seminars. Peter Davis is founder of a firm specializing in the security, audit, and control of information. Together, they cut through the cables, clutter, and confusion and help you:

Get off to a quick start and get mobile with IrDA (Infrared Data Association) and Bluetooth
Perform a site survey and select the right standard, mode, access point, channel and antenna
Check online to verify degree of interoperability of devices from various vendors
Install clients and set up roaming
Combat security threats such as war driving, jamming, hijacking, and man-in-the-middle attacks
Implement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network)
Set up multiple access points to form a larger wireless network

Complete with suggestions of places to get connected, Web sites where you can get more information, tools you can use to monitor and improve security, and more, Wireless Networks For Dummies helps you pull the plug and go wireless!