E-books Wifi

Wireless related e-books which deals with many aspects of wireless networking,security,hacking and countermeasures.

Wireless Maximum Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.


Advanced Wireless Communications: 4G Technologies

Advanced Wireless Communications: 4G Technologies
Topics covered include:Space Time Coding, including discussions on diversity gain, the encoding and transmission sequence, the combining s cheme and ML decision rule for two-branch transmit diversity scheme with one and M receivers.
Ultra Wide Band Radio, UWB multiple access in Gaussian channels, the UWB channel, UWB system with M-ary modulation, M-ary PPM UWB multiple access, coded UWB schemes, multi-user detection in UWB radio, UWB with space time processing and beam forming for UWB radio.
Antenna array signal processing with focus on Space-Time receivers for CDMA communications, MUSIC and ESPRIT DOA estimation, joint array combining and MLSE receivers, joint combiner and channel response estimation and complexity reduction in the wide-band beam forming
Channel modeling and measurement, adaptive MAC, adaptive routing and TCP layer are also addressed.
This book will supply the reader with a comprehensive understanding of the relationship between the systems performance, its complexity/reliability and cost-effectiveness. It gives an insight into the impact of existing and new technologies on the receiver structure and provides an understanding of current approaches and evolving directions for personal and indoor communication.
15.13 MB

Wireshark,Ethereal Network Protocol Analyzer Tool

Wireshark,Ethereal Network Protocol Analyzer Tool
by Angela D Orebaugh, Gilbert Ramirez, Jay Beale
Publisher: Syngress Publishing (November 1, 2006)
Language: English
ISBN: 1597490733
Pages: 552Overview:
Ethereal Network Protocol Analyzer Toolkit provides the reader with a completely integrated book and companion Web site to analyze network traffic using Ethereal, the world?s most popular network protocol analyzer on Windows, Unix, and Apple OS X. This book covers everything from the fundamentals of protocol analysis, to analyzing real world malicious code to programming advanced protocol dissectors. The companion Web site for the book offers dozens of working tools and scripts created for this book. This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereal?s graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal?s brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports.
Readers Review:
For the most part this book is an updated version of Ethereal Packet Sniffing. The title has been changed to more accurately reflect that it’s about using Wireshark and not so much about analyzing traffic (although that’s covered some), and also to denote that the project changed the name of the software recently. That said, it’s an improvement over Ethereal Packet Sniffing with some new material and some reorganization.Chapter 1 is an intro to network analysis, specifically with packet sniffing. It’s very cursory, and they could do a better job of teaching this subject, but honestly that’s a whole book unto itself and years of practice. The chapter is reasonably comprehensive and accurate.Chapter 2 introduces Wireshark and how to begin using it. This chapter is very short given what it says it will cover, but most of that is brought up in the following chapters. There’s a brief bit about Wireshark security, but again it’s too cursory (2 paragraphs for a program that ha sa constant stream of security issues). Also, the authors keep calling it Etehreal in places and Wireshark in others. This inconsistency doesn’t instill a great amount of trust in me that everything was reviewed well.Chapter 3 covers getting and installing Wireshark for Windows, Linux, OS X, and how to build it from source. It also covers packet capture drivers (ie on Windows). A very straightforward, direct chapter.

Using Wireshark is the next chapter, and this is where we start the meat of the book. It’s about 80 pages long and covers the UI and the command line options. The screen captures are better than the previous version of the book (and they often times use just a portion of the screen), but they could still be improved for legibility and for usefulness. This chapter covers the uncommon graphing and stats sections, and also following streams.

Filters are covered in Chapter 5, and the PCAP and Wireshark filter languages are covered. These are rich languages that allow for complex selectivity, and the chapter is clear and pretty comprehensive.A new topic is introduced in Chapter 6, specifically wireless sniffing. This is a good addition to the book, and even topics such as decoding EAP and WEP are covered. This is a good, concise overview of the topic of sniffing wireless networks.Real world packet captures are covered in Chapter 7, which is sadly too short (it could easily be a whole book). Several representative traces are included on the CD ROM that are good to study and review in this chapter. They include Linux worms and Windows malware, and also some coverage of active response packets is given.Just like the corresponding chapter in Ethereal Packet Sniffing, Chapter 8 covers developing plugins for Wireshark, specifically new protocol decodes. Because Wireshark has a framework to extend, it supports dozens of application and network layer protocols. You can add your favorite new protocol with ease if you follow this chapter. Who knows, you may even get it included. This is a real gem of the book.

Finally, Chapter 9 covers many of the auxiliary programs that are included with Wireshark. These programs let you manage packet traces and marge them or cut them down to size. These are useful even outside of Wireshark if you work with packet traces at all.

This book is a good update to the Ethereal Packet Sniffing book and material. Sadly, in many places the editors didn’t do a good job of auditing the book, so there are some mistakes and sometimes even references to the now obsolete name of Ethereal. However, the additions and improvements over the older version make this book worthwhile for anyone who needs to learn how to fully utilize this powerful sniffer.

H a c k i n g Exposed 5th Edition

A lot of computer-security textbooks approach the subject from a defensive point of view. “Do this, and probably you’ll survive a particular kind of attack,” they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle. A Jane’s-like catalog of the weaponry that black-hat hackers use is laid out in full. Readers see what programs are out there, get a rundown on what the programs can do, and benefit from detailed explanations of concepts (such as wardialing and rootkits) that most system administrators kind of understand, but perhaps not in detail. The book also walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of “honeypot” exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There’s a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols.

The result of all of this familiarity with bad-guy tools is a leg up on defending against them. Hacking Exposed wastes no time in explaining how to implement the countermeasures–where they exist–that will render known attacks ineffective. Taking on the major network operating systems and network devices one at a time, the authors tell you exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. They spare no criticism of products with which they aren’t impressed, and don’t hesitate to point out inherent, uncorrectable security weaknesses where they find them. This book is no mere rehashing of generally accepted security practices. It and its companion Web site are the best way for all of you network administrators to know thine enemies. –David Wall

Topics covered:
Security vulnerabilities of operating systems, applications, and network devices
Administrative procedures that will help defeat them
Techniques for hacking Windows 95, Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Novell NetWare, and Unix
Strategies for breaking into (or bringing down) telephony devices, routers, and firewalls


Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It’s easy enough to install Wireshark and begin capturing packets off the wire–or from the air. But how do you interpret those packets once you’ve captured them? And how can those packets help you to better understand what’s going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.

Wireshark (derived from the Ethereal project), has become the world’s most popular network sniffing application. But while Wireshark comes with documentation, there’s not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:

* Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more
* Build customized capture and display filters
* Tap into live network communication
* Graph traffic patterns to visualize the data flowing across your network
* Use advanced Wireshark features to understand confusing packets
* Build statistics and reports to help you better explain technical network information to non-technical users

Because net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.

About the Author
Chris Sanders is the network administrator for the Graves County Schools in Kentucky, where he manages more than 1,800 workstations, 20 servers, and a user base of nearly 5,000. His website, ChrisSanders.org, offers tutorials, guides, and technical commentary, including the very popular Packet School 101. He is also a staff writer for WindowsNetworking.com and WindowsDevCenter.com. He uses Wireshark for packet analysis almost daily.


McGraw Hill Hacking Exposed Wireless Mar 2007!, Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You’ll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.

Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
Defend against WEP key brute-force, aircrack, and traffic injection hacks
Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
Prevent rogue AP and certificate authentication attacks
Perform packet injection from Linux
Launch DoS attacks using device driver-independent tools
Exploit wireless device drivers using the Metasploit 3.0 Framework
Identify and avoid malicious hotspots
Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

Wi Fi Security

Wi Fi Security:
Security is now an essential element that forms the cornerstone of every corporate network. Without privacy, however, your solution is incomplete! My expertise in the areas of security and privacy has provided me with a valuable perspective that has enabled me to save my clients hundreds of thousands of dollars of what would have been revenue lost to hackers.


Wi-Foo – The Secrets Of Wireless Hacking

There are plenty of wireless security books. This one?s seriously ?hands-on.? It
was written by the leaders of one of the world?s top wireless security auditing
teams. Penetration testing is crucial to protecting yourself, and this book is
the source for mastering it. But it doesn?t just show you how to attack 802.11
networks — it shows how to detect and defeat those attacks, too.

First, you?ll assemble the arsenal needed to probe wireless network security:
hardware, drivers, utilities, network mapping and site surveying tools, and so
forth. The authors offer knowledgeable advice on cards, chipsets, antennas,
amplifiers, cables, connectors, Linux drivers and wireless extensions, and of
course software tools. When it comes to the underlying hardware, they go beyond
conventional PCs and notebooks, also discussing iPAQs and Sharp Zauruses running
Linux: super-handy for monitoring signal strength and discovering rogue access

Once you have your toolset, you?ll walk through planning your attack, gaining
access — and the awful stuff that can be done once inside. By now, netadmins
will be plenty motivated to fight back. The authors teach how, in detail. You?ll
learn how to make the most of cryptography (not just WEP); provide effective
user authentication, deploy higher-layer wireless VPNs, even implement a
wireless IDS system.

We needn?t remind you just how vulnerable many 802.11 networks still are, even
now. Let?s just say, if you want to do something about it, you?ll find this book
indispensable. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His
15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks
for Dummies, Second Edition.
From the Publisher

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless
networks. Authored by world-renowned wireless security auditors, this hands-on,
practical guide covers everything you need to attack — or protect — any
wireless network.

The authors introduce the ‘battlefield,’ exposing today’s ‘wide open’ 802.11
wireless networks and their attackers. One step at a time, you’ll master the
attacker’s entire arsenal of hardware and software tools: crucial knowledge for
crackers and auditors alike. Next, you’ll learn systematic countermeasures for
building hardened wireless ‘citadels”including cryptography-based techniques,
authentication, wireless VPNs, intrusion detection, and more.

Coverage includes:

* Step-by-step walkthroughs and explanations of typical attacks
* Building wireless hacking/auditing toolkit: detailed recommendations,
ranging from discovery tools to chipsets and antennas
* Wardriving: network mapping and site surveying
* Potential weaknesses in current and emerging standards, including 802.11i,
PPTP, and IPSec
* Implementing strong, multilayered defenses
* Wireless IDS: why attackers aren’t as untraceable as they think
* Wireless hacking and the law: what’s legal, what isn’t

If you’re a hacker or security auditor, this book will get you in. If you’re a
netadmin, sysadmin, consultant, or home user, it will keep everyone else out.
Library Journal

WarDriving-or moving around an area to map wireless access points-presents an
opportunity for those interested in raising awareness of wireless connectivity
and security vulnerabilities; an opening for those looking to contribute
connectivity through deliberately opening access; and a security threat to those
who fail to protect their networks-even though ethical WarDrivers point out that
they eschew unauthorized network use. WarDriving teaches how to WarDrive, from
necessary tools to useful software; each chapter ends with a summary, bullet
points, and FAQ. Later chapters discuss how to attack and how to defend wireless
networks, making this useful for readers wanting to protect their networks. The
main focus, however, may find a narrow audience in most libraries; those seeking
books on securing their network will want to supplement with more thorough
guides, and those interested in WarDriving may already be conversant with the
tools and ideas discussed. A supplemental purchase for larger libraries. Wi-Foo
covers similar ground and discusses similar utilities, yet it goes much deeper
into the nuts and bolts of both breaking into and defending wireless networks.
Some more technical sections are balanced out by step-by-step explanations of
security basics and patterns of attack. Extensive appendixes range from antenna
irradiation patterns to war-chalking symbols to a penetration testing template.
Wireless security is an ever-growing issue, which makes this thorough guide
recommended for larger libraries.


Wireless Networks Details

Designing a Wireless Network

Digital Press Wireless Operational Security


War Driving — Wireless Network Discovery and Visualization

art of wardriving—using a car equipped with a computer, a wireless card, and software to identify the presence of a Wi-Fi signal, even if you’re out on a deserted highway. What an ­excellent idea! It’s surprising how ubiquitous Wi-Fi signals have become. You’ll find everything you need to get started as a budding wardriver

Download Guide Here

WarDriving – Drive, Detect, Defend – A Guide To Wireless Security


WarDriving and Wireless Penetration Testing

Wireless networking has become standard in many business and government
networks. This book is the first book that focuses on the methods used by
professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in
recent years, this book is geared primarily to those individuals that are tasked
with performing penetration testing on wireless networks. This book continues in
the successful vein of books for penetration testers such as Google Hacking for
Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally,
the methods discussed will prove invaluable for network administrators tasked
with securing wireless networks. By understanding the methods used by
penetration testers and attackers in general, these administrators can better
define the strategies needed to secure their networks.

* According to a study by the Strategis Group more than one third of the words
population will own a wireless device by the end of 2008.

* The authors have performed hundreds of wireless penetration tests, modeling
their attack methods after those used by real world attackers.

* Unlike other wireless books, this is geared specifically for those individuals
that perform security assessments and penetration tests on wireless networks.

Table of Contents
1. Introduction to WarDriving and Penetration Testing

2. Understanding Antenna Theory

3. WarDriving with Handheld Devices and Direction Finding

4. Performing Penetration Testing on Wireless Networks using Linux

5. Performing Penetration Testing on Wireless Networks using OS X

6. Performing Penetration Testing on Wireless Networks using a Bootable CD

7. Mapping WarDrives

8. Using Man in the Middle Attacks to Your Advantage

9. Using Custom Firmware


Syngress – Wireless Hacking. Projects for Wi-Fi Enthusiasts

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes–which include client and network hub devices–up from about 4 million last year. This third book in the “HACKING” series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g (Wi-Fi) projects teaching these millions of Wi-Fi users how to “mod” and “hack” Wi-Fi access points, network cards, and antennas to run various Linux distributions and create robust Wi-Fi networks.

Cahners predicts that wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless out of a total of 14.4 million home LAN nodes shipped. This book will show Wi-Fi enthusiasts and consumers of Wi-Fi LANs who want to modify their Wi-Fi hardware how to build and deploy homebrew Wi-Fi networks, both large and small.

* Wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless clients out of a total of 14.4 million home LAN nodes shipped.

* This book will use a series of detailed, inter-related projects to teach readers how to modify their Wi-Fi hardware to increase power and performance to match that of far more expensive enterprise networking products. Also features hacks to allow mobile laptop users to actively seek wireless connections everywhere they go!

* The authors are all members of the San Diego Wireless Users Group, which is famous for building some of the most innovative and powerful “home brew” Wi-Fi networks in the world.


Product Details

Hardcover: 280 pages
Publisher: CRC (September 7, 2007)
Language: English
ISBN-10: 1420045237
ISBN-13: 978-1420045239




Pay for more enhanced tutorials and keep funding this project

contributors are welcome ,any donation appreciated.

Paypal ID:tech.secure.it@gmail.com

  1. Alex says:

    Your blog is interesting!

    Keep up the good work!

  2. Lucio says:

    Excellent Info!!!!

  3. Gabrella says:

    I just found out about this resourceful site of yours. i like it and thank you for the great work. You’re wonderful. Gabrella.

  4. eriq says:


  5. falaffel says:

    thanks for the great collection of resources. was looking for wordlists, but your ebook links got me staying^^

  6. Steadlept says:

    Very Good site, thank yo mister, it’s help’s me!

  7. Arif junaedi says:

    Blog yang gue cari cari nda tahunya ada.thanks 4 all

  8. prayas says:

    your blog is just awsome thanxxx for sharing man

  9. kaizendeen says:

    artikel very very very quality..tahnks for sharing..

  10. I love your blog
    good on you mate…

  11. lol says:

    the links not working please fix thanks

  12. Jeanette says:

    Hello everyone, it’s my first pay a quick visit at this web site, and paragraph
    is truly fruitful designed for me, keep up posting
    these articles or reviews.

  13. LoL Cheats says:

    You should be a part of a contest for one of the finest websites on the web.

    I will highly recommend this web site!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s