Linksys WRT54G Ultimate Hacking
Title | Linksys WRT54G Ultimate Hacking PDF eBook |
Author | Paul Asadoorian |
Publisher | Syngress |
Pages | 385 |
Release | 2011-04-18 |
Genre | Computers |
ISBN | 0080556132 |
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system. - Never before seen and documented hacks, including wireless spectrum analysis - Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform - Full coverage on embedded device development using the WRT54G and OpenWRT
Linksys WRT54G Ultimate Hacking
Title | Linksys WRT54G Ultimate Hacking PDF eBook |
Author | Paul Asadoorian |
Publisher | Syngress Press |
Pages | 368 |
Release | 2007 |
Genre | Computers |
ISBN | 1597491667 |
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS. Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system. * Never before seen and documented hacks, including wireless spectrum analysis * Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform * Full coverage on embedded device development using the WRT54G and OpenWRT
Hack the Stack
Title | Hack the Stack PDF eBook |
Author | Stephen Watkins |
Publisher | Elsevier |
Pages | 481 |
Release | 2006-11-06 |
Genre | Computers |
ISBN | 0080507743 |
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.* Remember being a child and wanting to take something apart, like a phone, to see how it worked? This book is for you then as it details how specific hacker tools and techniques accomplish the things they do. * This book will not only give you knowledge of security tools but will provide you the ability to design more robust security solutions * Anyone can tell you what a tool does but this book shows you how the tool works
Big Book of Apple Hacks
Title | Big Book of Apple Hacks PDF eBook |
Author | Chris Seibold |
Publisher | "O'Reilly Media, Inc." |
Pages | 640 |
Release | 2008 |
Genre | Computers |
ISBN | 0596529821 |
The Big Book of Apple Hacks offers a grab bag of tips, tricks and hacks to get the most out of Mac OS X Leopard, as well as the new line of iPods, iPhone, and Apple TV. With 125 entirely new hacks presented in step-by-step fashion, this practical book is for serious Apple computer and gadget users who really want to take control of these systems. Many of the hacks take you under the hood and show you how to tweak system preferences, alter or add keyboard shortcuts, mount drives and devices, and generally do things with your operating system and gadgets that Apple doesn't expect you to do. - Publisher.
Hacking Exposed Wireless
Title | Hacking Exposed Wireless PDF eBook |
Author | Johnny Cache |
Publisher | McGraw Hill Professional |
Pages | 418 |
Release | 2007-04-10 |
Genre | Computers |
ISBN | 0071509690 |
Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys
Wireless Hacks
Title | Wireless Hacks PDF eBook |
Author | Rob Flickenger |
Publisher | "O'Reilly Media, Inc." |
Pages | 310 |
Release | 2003 |
Genre | Computers |
ISBN | 9780596005597 |
Continuing with the successful Hack Series, this title provides real-world working examples of how to make useful things happen with wireless equipment.
Asterisk
Title | Asterisk PDF eBook |
Author | Jim Van Meggelen |
Publisher | "O'Reilly Media, Inc." |
Pages | 602 |
Release | 2007-08-28 |
Genre | Computers |
ISBN | 0596510489 |
Provides information on Asterisk, an open source telephony application.