WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] - نسخه متنی

Andrew A. Vladimirov

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید














Summary




Thoughtful selection of wireless hardware for your security evaluation tasks can save a lot of time, effort, and money and tremendously increase your capability to run the attacks. Such selection should be based on the specific technical criteria that we have briefly outlined in this chapter. It should not stem from advertisements or recommendations not reinforced by thorough and well-argumented technical explanation. Nevertheless, you can probably use any wireless client card you already have for penetration testing, albeit with some additional patching and tweaking. Various tasks require different wireless hardware for maximum security auditing efficiency. Don't bet on a single set of hardware to suit all cases; be prepared for different methodologies and hardware sets depending on the target and the audit demands.



/ 174