NOTE: We are upgrading our eBook operations; please allow up to 1-2 days for delivery of your eBook order.
»
Kismet Hacking
 
 

Kismet Hacking, 1st Edition

 
Kismet Hacking, 1st Edition,Frank Thornton,Michael Schearer,Brad Haines,ISBN9781597491174
 
 
 

  &      &      

Syngress

9781597491174

9780080558707

272

235 X 191

The only book on the industry standard for examining wireless network traffic!

Print Book + eBook

USD 71.34
USD 118.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 60.95

eBook
eBook Overview

DRM Free included formats: EPub, Mobi, PDF

USD 57.95
Add to Cart
 
 

Key Features

*Wardrive Running Kismet from the BackTrack Live CD

*Build and Integrate Drones with your Kismet Server

*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Description

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.

Readership

New and experienced information security professionals; advanced computer users who are interesting in using Kismet

Frank Thornton

Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."

Affiliations and Expertise

Owner, Blackthorn Systems, New Hampshire, USA

View additional works by Frank Thornton

Michael Schearer

Brad Haines

Brad "RenderMan" Haines, Contributing Author to RFID Security (ISBN: 978-1-59749-047-4, Syngress) and Kismet Hacking (ISBN: 978-1-59749-117-4, Syngress), is chief researcher of Renderlab.net and co-refounder of "The Church of WiFi" wireless think tank. He currently operates his own consulting company in Edmonton, Alberta, Canada, providing wireless performance and security assessment services for a variety of clients both large and small. A noted expert in the hacker community in the field of wireless security, he has spoken at many international conferences such as Black Hat and DEFCON and taught several classes on free wireless assessment tools. He has also contributed over time to many wireless security tools such as the Kismet wirelss sniffer and coWPAtty.

Affiliations and Expertise

Chief researcher of Renderlab.net

Kismet Hacking, 1st Edition

Introduction / Design Structure - This chapter tells how Kismet functions as well as background information on the design of the different models 2. Basic Install - Covers the installation process, and selection of various wireless cards and other equipment such as GPS receivers and antennas 3. Basic Menus - Details on the main menus for operating Kismet 4. Server .conf File Configuration - Configuration of the Server portion of the program. 5. Client .conf File Configuration - Configuration of the Client and User Interface section of the application. 6. Advanced Configuration - Tweaking and complex uses for cutting edge users 7. Drones - Setting up Drone Kismet servers as for remote operations 8. IDS Setup - How to combine Drones into an advanced Wireless Intrusion Detection System 9. GPSmap - Making Kismet plot where it’s been, and provideing advanced maps and diagrams
 
 
Discount on Science and Technology eBooks | Use code DRMFREE
NOTE: We are upgrading our eBook operations; please allow up to 1-2 days for delivery of your eBook order.