Hacking Bluetooth
Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to
Read moreAnother wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to
Read moreThe subject of wireless cards and chipsets is important. Although in many cases the chipset on the card and the
Read moreIn order to attack, you must first find a target, and though site surveys can make this easier, they cannot
Read moreNetwork-level session hijacking is a hijacking method that focuses on exploiting a TCP/IP connection after initialization or authentication has occurred.
Read moreFirewalls and IDS/IPS appliances are part of a secure network, but in this article we’ll look briefly at the placement
Read moreWi-Fi is very susceptible to attack — even more so than wired networks if it’s not configured or deployed properly.
Read moreUse stateful inspection rules that monitor traffic sessions for firewalls. This can help ensure that all traffic traversing the firewall
Read moreSimple Network Management Protocol (SNMP) is built in to virtually every network device. Network management programs (such as HP OpenView
Read more