WarDriving and Wireless Penetration Testing by Chris Hurley
Look inside with Google Book Preview
WarDriving and Wireless Penetration Testing
By Chris Hurley

WarDriving and Wireless Penetration Testing

By (author) See other recent books by Chris Hurley See other recent books by Russ Rogers See other recent books by Frank Thornton
Format: Paperback

Normal Price: $64.95
Your Price: $58.46 AUD, inc. GST
Shipping: $7.95 per order
You Save: $6.49! (10% off normal price)
Plus...earn $2.92 in Boomerang Bucks
Availability: Available Available to Backorder, No Due Date for Supply

WarDriving and Wireless Penetration Testing by Chris Hurley

Book Description

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.

Buy WarDriving and Wireless Penetration Testing book by Chris Hurley from Australia's Online Bookstore, Boomerang Books.

Book Details

ISBN: 9781597491112
ISBN-10: 159749111X
Format: Paperback
(229mm x 178mm x 30mm)
Pages: 446
Imprint: Syngress Media,U.S.
Publisher: Syngress Media,U.S.
Publish Date: 8-Nov-2006
Country of Publication: United States

Books By Author Chris Hurley

How to Cheat at Securing a Wireless Network by Chris Hurley How to Cheat at Securing a Wireless Network, Paperback (August 2006)

Offers the busy network administrator with solutions to securing the wireless network. This book provides the basic tools and instruction to maintain a secure network while allowing acceptable access to users.

OS X for Hackers at Heart by Chris Hurley OS X for Hackers at Heart, Paperback (December 2005)

Covering OS X 10.4 Tiger, this book teaches hackers - from software developers to security professionals to hobbyists - how to use the powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and more.

InfoSec Career Hacking by Chris Hurley InfoSec Career Hacking, Paperback (June 2005)

Describes different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. This book also explains how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques.

WarDriving: Drive, Detect, Defend by Chris Hurley WarDriving: Drive, Detect, Defend, Paperback (April 2004)

The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in metropolitan area worldwide.

» View all books by Chris Hurley


» Have you read this book? We'd like to know what you think about it - write a review about WarDriving and Wireless Penetration Testing book by Chris Hurley and you'll earn 50c in Boomerang Bucks loyalty dollars (you must be a member - it's free to sign up!)

Write a book review

Author Biography - Chris Hurley

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important. Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, Sao Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2(R) (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu). Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."

Boomerang Bucks close

For every $20 you spend on books, you will receive $1 in Boomerang Bucks loyalty dollars. You can use your Boomerang Bucks as a credit towards a future purchase from Boomerang Books. Note that you must be a Member (free to sign up) and that conditions do apply.

Recent books by Chris Hurley close
How to Cheat at Securing a Wireless Network by Chris Hurley
OS X for Hackers at Heart by Chris Hurley
InfoSec Career Hacking by Chris Hurley
WarDriving: Drive, Detect, Defend by Chris Hurley
Recent books by Russ Rogers close
Hacker's Guide to OS X by Russ Rogers
Nessus Network Auditing by Russ Rogers
IT Security Interviews Exposed by Russ Rogers
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators by Russ Rogers
WarDriving and Wireless Penetration Testing by Russ Rogers
17 Laws of Parenting by Russ Rogers
17 Laws of Parenting by Russ Rogers
Security Assessment by Russ Rogers
Recent books by Frank Thornton close
How to Cheat at Deploying and Securing RFID by Frank Thornton
Kismet Hacking by Frank Thornton
WarDriving and Wireless Penetration Testing by Frank Thornton
RFID Security by Frank Thornton
BoomerangBooks.com.au close