Customer Reviews


3 Reviews
5 star:
 (1)
4 star:
 (1)
3 star:    (0)
2 star:
 (1)
1 star:    (0)
 
 
 
 
 
Average Customer Review
Share your thoughts with other customers
Create your own review
 
 

The most helpful favourable review
The most helpful critical review


2 of 2 people found the following review helpful
5.0 out of 5 stars Yet another exelent Hacking Exposed book
Hacking Exposed Wireless is built on the same template as the other excellent books in the Hacking Exposed series. I find the book very informative, and I'll keep it close, when I'll perform WiFi testing on the corporate network.

The Attack and Countermeasure sections in the chapters of the Hacking Exposed series, are one of the things I really like about...
Published on 28 April 2010 by Michael Christensen

versus
2.0 out of 5 stars Beware of the Kindle restrictions with this book
The content of this book does not disappoint me. Had I bought the hard copy, I would not have felt the need to write this word of warning to others. Throughout this book, there are various 'case studies'. These case studies clearly form an important part of the book and without them, the reader is going to be missing out on a lot of interesting material.

My...
Published on 10 July 2011 by Matthew


Most Helpful First | Newest First

2 of 2 people found the following review helpful
5.0 out of 5 stars Yet another exelent Hacking Exposed book, 28 April 2010
By 
Michael Christensen (Denmark) - See all my reviews
(REAL NAME)   
This review is from: Hacking Exposed Wireless: Wireless Security Secrets & Solutions: Wireless Security Secrets and Solutions (Paperback)
Hacking Exposed Wireless is built on the same template as the other excellent books in the Hacking Exposed series. I find the book very informative, and I'll keep it close, when I'll perform WiFi testing on the corporate network.

The Attack and Countermeasure sections in the chapters of the Hacking Exposed series, are one of the things I really like about books. They give you a good overview about the risks involved - and how to test and mitigate these risks.

The book consists of 11 chapters grouped in 3 sections: I) Overview, II) Hacking 802.11 Wireless Technologies and III) Hacking additional Wireless Technologies.

1. Section I - Overview.

· Chapter 1 gives you the fundamentals to Wireless technology and describes the common security problems.
· Chapter 2 is quite techie with some use of math for explaining how to calculate effect, antennas etc.

2. Section II - Hacking 802.11 Wireless Technologies.
This section explains from the basics of Wireless security to the more advanced and well protected implementations of Wireless security.

· Chapter 3 is a quite comprehensive guide to the history of the 802.11 protocol, and with that information, you are well equipped to go on to the following chapters. The description of the protocol is vital to understand how the vulnerabilities work.
· Chapter 4 is the description of how to discover and map wireless networks.
· Scanning and enumeration is the next step, and in Chapter 5 all the vital features are covered.
· Attacking `WEP secured WiFi networks' is covered in chapter 6, and I must say, I found this information useful. Having already done some pentesting on WEP secured Access Points (AP), I found the explanations and examples very interesting, and I'm going to try out some of the techniques explained here, next time I have an AP to test.
· WPA and WPA2 are normally considered to be pretty safe, if you choose the right password. But still the techniques described of how to deal with wireless enterprise setups, surprised me, and they should be taken in consideration, when documenting the risks in the corporate wireless network.
· Deploying security as described in chapter 8 covers the finer art of securing your wireless network.

3. Section III - Hacking additional Wireless Technologies

· A few acquaintances of mine have bragging about how weak the security is on hotels - and how they got free internet during their stay. Chapter 9 covers many of the weaknesses of public AP's like the ones in hotels, airports etc.
· The Bluetooth attack on a Mac from chapter 10 was quite new to me. I haven't done much in relation to Bluetooth. I have been aware of the fact, there is a risk involved with opening a Bluetooth connection in the public, but not that it could be exploited like that. It was a kind of eye-opener for me.
· The advanced attacks in chapter 11 are some of the issues I'll pay some attention next time I am to test a network. Especially the attacks that can be launched from Metasploit 3.0 sounds interesting (aka scary).

The book also covers threats like rough access points (and how to deal with them). I found this so much of an inspiration, that I want to try it out on one of the educational institutions in the town - of course with a formal approval.

If you work with issues of wireless security, I find this book a must have, and in my opinion, it is sufficient for penetration testers and technicians who are to install corporate networks. With the book in hand, they can do, what has to be done. The book is clearly not targeted against end-users.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


2.0 out of 5 stars Beware of the Kindle restrictions with this book, 10 July 2011
Verified Purchase(What is this?)
The content of this book does not disappoint me. Had I bought the hard copy, I would not have felt the need to write this word of warning to others. Throughout this book, there are various 'case studies'. These case studies clearly form an important part of the book and without them, the reader is going to be missing out on a lot of interesting material.

My concerns were raised when I came to the first case study in the kindle edition. Unfortunately, it is impossible to scroll through and read any of the case studies. I do not know the reason why this is. However, when you try to continue reading a case study onto the second page, the kindle will take you to the first section outside of the case study.

In short with the kindle edition, you will not get the case studies. Had I known this, I would have simply bought the hard copy of the book in the first place.

I feel cheated.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


0 of 4 people found the following review helpful
4.0 out of 5 stars I am very Pleased, 7 Jun. 2010
By 
Mr. A. Mohammed (England) - See all my reviews
(REAL NAME)   
This review is from: Hacking Exposed Wireless: Wireless Security Secrets & Solutions: Wireless Security Secrets and Solutions (Paperback)
The product was delivered on time and in good condition. Absolutely brilliant transaction.

Thank you.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


Most Helpful First | Newest First

This product

Only search this product's reviews