CEH Certified Ethical Hacker Practice Exams, Third Edition (All-In-One) by Walker Matt
Author:Walker, Matt [Walker, Matt]
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2016-12-01T16:00:00+00:00
CHAPTER
7
Wireless Network Hacking
This chapter includes questions from the following topics:
• Describe wireless network architecture and terminology
• Identify wireless network types and forms of authentication
• Describe wireless encryption algorithms
• Identify wireless hacking methods and tools
• Describe mobile platform attacks
• Identify Mobile Device Management
* * *
I grew up in a time when television had only three channels, the music industry was all up in arms because of the new technology allowing anyone to tape their own music (cassette tapes), and if you needed to talk to someone about something, you had to either meet them face to face or call their one and only home phone (and hope they were there). Oh, sure, the ultra-rich had phones built into their limos (not really much more than glorified CB radio devices actually), but the idea of a cell phone didn’t really hit the public consciousness until sometime in the early 1980s. In fact, the first real foray into the technology came in 1973, when a Motorola researcher created a mobile phone. The handset came in at a stealthy 8 by 5 inches, weighing approximately 2½ pounds, and offered a whopping 30 minutes of talk time.
After a decade or so of further research and attempts at bringing the technology to market, the first analog cellular network (Advanced Mobile Phone Service [AMPS]) hit the United States, and a company called DynaTAC released a device that has been ridiculed in technology circles for decades now—the bag phone. Despite the weight and bulkiness of the system and that it provided only a half hour of talk time and took nearly 10 hours to charge, demand for the thing was incredible, and people signed up on waiting lists by the thousands.
I remember quite clearly how jealous I felt seeing people driving around with those ultra-cool giant-battery phones that they could use anywhere. I even looked into buying one and can remember the first time I slung that big old bag over my head to rest the strap on my shoulder so I could heft the cord-connected handset and dial home. Looking back, it seems really silly, but that strong desire by the consumer population fueled an explosion in mobile device technology that has changed the world.
The wireless revolution touched everything in life—not just the humble phone. We looked at making everything wireless and just knew we could do it. (Star Trek had been showing wireless communication for decades, so why not?) Computer networks were an obvious branch to follow, and seemingly everything else followed. Our wireless technologies are now as much part of life as the light switch on the wall—we wouldn’t know what to do without them, and we all just expect it all to work. Hence the problem.
I’ve said repeatedly that almost every technological implementation designed to make our lives easier and better can be, and usually has already been, corrupted by the bad guys, and wireless tech is no exception. Wireless networks are everywhere, and they’re broadcasting information across the air that anyone can pick up.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7787)
Grails in Action by Glen Smith Peter Ledbrook(7704)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6423)
Kotlin in Action by Dmitry Jemerov(5073)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3834)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3089)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2611)
Drugs Unlimited by Mike Power(2473)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2334)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2265)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2231)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2195)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2079)
Full-Stack React Projects by Shama Hoque(1992)
