Kismet Hacking

Kismet Hacking
Author: Brad Haines,Michael J. Schearer,Frank Thornton,Thorn Thornton
Publsiher: Syngress Press
Total Pages: 258
Release: 2008
ISBN 10: 9781597491174
ISBN 13: 1597491179
Language: EN, FR, DE, ES & NL

Kismet Hacking Book Review:

"Kismet Hacking" brings together two premier wireless security experts to outline how to successfully use the top wireless tool, Kismet.

Kismet Hacking

Kismet Hacking
Author: Frank Thornton,Michael J. Schearer,Brad Haines
Publsiher: Syngress
Total Pages: 272
Release: 2008-08-08
ISBN 10: 9780080558707
ISBN 13: 0080558704
Language: EN, FR, DE, ES & NL

Kismet Hacking Book Review:

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Linksys WRT54G Ultimate Hacking

Linksys WRT54G Ultimate Hacking
Author: Paul Asadoorian,Larry Pesce
Publsiher: Syngress
Total Pages: 412
Release: 2011-04-18
ISBN 10: 9780080556130
ISBN 13: 0080556132
Language: EN, FR, DE, ES & NL

Linksys WRT54G Ultimate Hacking Book Review:

This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G’s hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS. Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system. Never before seen and documented hacks, including wireless spectrum analysis Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform Full coverage on embedded device development using the WRT54G and OpenWRT

Hacking Exposed 5th Edition

Hacking Exposed 5th Edition
Author: Stuart McClure,Joel Scambray,George Kurtz
Publsiher: McGraw-Hill Osborne Media
Total Pages: 692
Release: 2005-04-19
ISBN 10:
ISBN 13: UOM:39015060895805
Language: EN, FR, DE, ES & NL

Hacking Exposed 5th Edition Book Review:

Analyzes attacks on computer networks, discusses security, auditing, and intrusion detection procedures, and covers hacking on the Internet, attacks against Windows, e-commerce hacking methodologies, and new discovery tools.

Hacking Exposed Linux

Hacking Exposed Linux
Author: ISECOM
Publsiher: McGraw Hill Professional
Total Pages: 600
Release: 2007-08-22
ISBN 10: 9780071596428
ISBN 13: 0071596429
Language: EN, FR, DE, ES & NL

Hacking Exposed Linux Book Review:

The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic

Hacking Exposed 7 Network Security Secrets Solutions Seventh Edition

Hacking Exposed 7   Network Security Secrets   Solutions  Seventh Edition
Author: Stuart McClure,Joel Scambray,George Kurtz
Publsiher: McGraw Hill Professional
Total Pages: 768
Release: 2012-07-11
ISBN 10: 0071780289
ISBN 13: 9780071780285
Language: EN, FR, DE, ES & NL

Hacking Exposed 7 Network Security Secrets Solutions Seventh Edition Book Review:

The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment “Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.” Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself

Hacking Exposed Wireless Third Edition

Hacking Exposed Wireless  Third Edition
Author: Joshua Wright,Johnny Cache
Publsiher: McGraw Hill Professional
Total Pages: 560
Release: 2015-03-19
ISBN 10: 0071827625
ISBN 13: 9780071827621
Language: EN, FR, DE, ES & NL

Hacking Exposed Wireless Third Edition Book Review:

Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker’s weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks using Ettercap and the WiFi Pineapple Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS Exploit holes in WPA and WPA2 personal and enterprise security schemes Leverage rogue hotspots to deliver remote access software through fraudulent software updates Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic Capture and evaluate proprietary wireless technology with Software Defined Radio tools Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices Attack remote wireless networks using compromised Windows systems and built-in tools

Hacking Exposed Sixth Edition

Hacking Exposed  Sixth Edition
Author: Stuart McClure,Joel Scambray,George Kurtz
Publsiher: McGraw Hill Professional
Total Pages: 752
Release: 2009-02-01
ISBN 10: 0071613757
ISBN 13: 9780071613750
Language: EN, FR, DE, ES & NL

Hacking Exposed Sixth Edition Book Review:

The tenth anniversary edition of the world's bestselling computer security book! The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more. Hacking Exposed 6 applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer technology usage and deployments safer and more secure for businesses and consumers. "A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times "The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to secure." --Bill Machrone, PC Magazine "A must-read for anyone in security . . . One of the best security books available." --Tony Bradley, CISSP, About.com

Hacking and Penetration Testing Ultimate CD

Hacking and Penetration Testing Ultimate CD
Author: Jay Beale,Syngress,Brad Haines,Jan Kanclirz,Johnny Long,Angela Orebaugh
Publsiher: Syngress Media Incorporated
Total Pages: 329
Release: 2009-08-10
ISBN 10: 9781597494465
ISBN 13: 1597494461
Language: EN, FR, DE, ES & NL

Hacking and Penetration Testing Ultimate CD Book Review:

Hacking and Penetration Testing Ultimate CD contains six of our best-selling titles. This collection of ebooks provides the IT security professional with easy access to loads of information on a single CD. It contains over 2300 pages of techniques and tools. This features: *Long: "Google Hacking: Volume One," 9781931836364 *Jackson, et al.: "Asterisk Hacking," 9781597491518 *Haines, et al.: "Kismet Hacking," 9781597491174 *Kanclirz: "NetCat Power Tools," 9781597492577 *Beale, et al.: "Pentester's Open Source Toolkit," 9781597490214 *Orebaugh and Pinkard: "Nmap in the Enterprise," 9781597492416"

Advanced Persistent Threat Hacking

Advanced Persistent Threat Hacking
Author: Tyler Wrightson
Publsiher: McGraw Hill Professional
Total Pages: 464
Release: 2014-12-19
ISBN 10: 0071828370
ISBN 13: 9780071828376
Language: EN, FR, DE, ES & NL

Advanced Persistent Threat Hacking Book Review:

Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks. Review empirical data from actual attacks conducted by unsophisticated and elite APT hackers alike Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads

Seven Deadliest Wireless Technologies Attacks

Seven Deadliest Wireless Technologies Attacks
Author: Brad Haines
Publsiher: Syngress
Total Pages: 160
Release: 2010-03-13
ISBN 10: 9781597495424
ISBN 13: 1597495425
Language: EN, FR, DE, ES & NL

Seven Deadliest Wireless Technologies Attacks Book Review:

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers. Attacks detailed in this book include: 802.11 Wireless—Infrastructure Attacks 802.11 Wireless—Client Attacks Bluetooth Attacks RFID Attacks Analog Wireless Device Attacks Bad Encryption Attacks on Cell Phones, PDAs and Other Hybrid Devices

Information Security and Ethics

Information Security and Ethics
Author: Hamid R. Nemati
Publsiher: Unknown
Total Pages: 4037
Release: 2008
ISBN 10:
ISBN 13: IND:30000122428265
Language: EN, FR, DE, ES & NL

Information Security and Ethics Book Review:

"This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges."--Provided by publisher.

Hacking with Kali Linux

Hacking with Kali Linux
Author: Dylan Mach
Publsiher: Independently Published
Total Pages: 160
Release: 2019-12-18
ISBN 10: 9781675092842
ISBN 13: 1675092842
Language: EN, FR, DE, ES & NL

Hacking with Kali Linux Book Review:

Are you interested in learning how to protect your own computer, and get it set up so that a hacker is not able to get onto it? Are you looking for a big career change and would like to learn more about computer programming and hacking in general? Would you like to be able to hack like the hackers and learn the best ways to find vulnerabilities of a system? Then this guidebook is the right one for your needs! This guidebook is going to spend some time and attention to the different options that you need to know when it is time to get started with hacking and protecting your own network. This guidebook has all of the tips and tools that will make you successful in no time. Some of the different techniques, methods, and topics that we are able to talk about when it comes to the world of hacking, especially when it comes to hacking with the Kali Linux system will include: The basics of hacking and some of the basic hacks that you are likely to encounter along the way. The steps of hacking and how a hacker can use this to their advantage. Why Kali Linux is one of the best options to help us get started with hacking and how we are able to download and install this on any computer that we would like. Why your firewall is important to keeping your system safe and secure. A few of the options that you can use when it is time to hack, including Kismet and more. How to use VPN's Tor and more to make sure that your information is safe and secure and that it is really hard for others to find you while you are online. A look at the steps you can use to get onto a wireless network, even when it has some safety protocols attached to it. The importance of working with IP spoofing and how this helps hackers get onto the network that they want. Getting through the MAC addresses so you can look like you belong. How to work with the basics of a penetration test to see the best results. There are so many different parts that are going to come when it is time to learn how to do some of your own hacks. Even if you are working to protect your own network, the tools, techniques, and methods that we are going to talk about in this guidebook will help us to see success. When you are ready to learn more about hacking and how the Kali Linux system is able to help you see the results you want in no time, make sure to check out this guidebook to get started! So, now... Scroll up and select the Buy now with 1-Click Button!

Hacking Wireless Networks For Dummies

Hacking Wireless Networks For Dummies
Author: Kevin Beaver,Peter T. Davis
Publsiher: John Wiley & Sons
Total Pages: 384
Release: 2011-05-09
ISBN 10: 1118084926
ISBN 13: 9781118084922
Language: EN, FR, DE, ES & NL

Hacking Wireless Networks For Dummies Book Review:

Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor towardbecoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional(CWNP) Program Wireless networks are so convenient - not only for you, but alsofor those nefarious types who'd like to invade them. The only wayto know if your system can be penetrated is to simulate an attack.This book shows you how, along with how to strengthen any weakspots you find in your network's armor. Discover how to: Perform ethical hacks without compromising a system Combat denial of service and WEP attacks Understand how invaders think Recognize the effects of different hacks Protect against war drivers and rogue devices

Hacking Linux Exposed

Hacking Linux Exposed
Author: Brian Hatch,James Lee,George Kurtz
Publsiher: McGraw-Hill Osborne Media
Total Pages: 712
Release: 2003
ISBN 10: 9780072225648
ISBN 13: 0072225645
Language: EN, FR, DE, ES & NL

Hacking Linux Exposed Book Review:

Offers detailed information on Linux-specific internal and external hacks, explaining how to tighten and maintain security on Linux networks.

Wireless Hacks

Wireless Hacks
Author: Rob Flickenger,Roger Weeks
Publsiher: "O'Reilly Media, Inc."
Total Pages: 440
Release: 2005-11-29
ISBN 10: 0596101449
ISBN 13: 9780596101442
Language: EN, FR, DE, ES & NL

Wireless Hacks Book Review:

The authors bring readers more of the practical tips and tricks that made the first edition a runaway hit. Completely revised and updated, this version includes over 30 new hacks, major overhauls of over 30 more, and timely adjustments and touch-ups to dozens of other hacks.

Hacking Exposed Wireless

Hacking Exposed Wireless
Author: Johnny Cache,Vincent Liu
Publsiher: McGraw Hill Professional
Total Pages: 386
Release: 2007-04-10
ISBN 10: 0071509690
ISBN 13: 9780071509695
Language: EN, FR, DE, ES & NL

Hacking Exposed Wireless Book Review:

Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

The Pro Hacker s Guide to Hacking

The Pro Hacker s Guide to Hacking
Author: Anuj Mishra
Publsiher: Unknown
Total Pages: 121
Release: 2018-06
ISBN 10: 9781983052385
ISBN 13: 1983052388
Language: EN, FR, DE, ES & NL

The Pro Hacker s Guide to Hacking Book Review:

This book on "Hacking & Penetration testing" focuses on the basic concepts of hacking, its implementations & practical demonstrations. The very significant methods of hacking are properly described & illustrated in a robust manner. An average person with no prior knowledge of hacking can also read & understand the essentials of the book. This is so because the book has been written in a very friendly & self-explanatory language by the author. The book has been divided into various sections that are critical as per hacker's perspective. It includes social engineering, spoofing & MITM, Wi-Fi Hacking, client side attacks, etc.Learn about different hacking tools & methods such as: - Hacking Android- Hacking Any Windows Remotely using an image without any access- Hacking Windows - Using Metasploit- Cracking Passwords Using THC Hydra- Hacking WEP WPA2 Protected WiFi- Hacking Any WiFi -WiFiPhisher, Kismet, Fluxion, Evil Twin- Sniffing Data using ARPSpoof- Sniffing DNS using DNSSpoof- DHCP Spoofing- Man-In-The-Middle Attack [MITM]- Password Sniffing and much more...The author of the book, Anuj Mishra, is a reputed blogger as well as an ethical hacker. His blog "HackeRoyale" has been ranked as TOP 75 HACKER BLOG ON EARTH in an independent survey conducted by FeedSpot.

Kali Linux An Ethical Hacker s Cookbook

Kali Linux   An Ethical Hacker s Cookbook
Author: Himanshu Sharma
Publsiher: Packt Publishing Ltd
Total Pages: 376
Release: 2017-10-17
ISBN 10: 1787120287
ISBN 13: 9781787120280
Language: EN, FR, DE, ES & NL

Kali Linux An Ethical Hacker s Cookbook Book Review:

Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.

Hacking Exposed Wireless

Hacking Exposed Wireless
Author: Johnny Cache,Vincent Liu
Publsiher: Mcgraw-hill
Total Pages: 386
Release: 2007-03-26
ISBN 10: 9780072262582
ISBN 13: 0072262583
Language: EN, FR, DE, ES & NL

Hacking Exposed Wireless Book Review:

Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys