We are now done with Day 7, so let us recap. Making sure the infrastructure if protected is important to any customer/company, so as penetration testers, it is our job to find issues that may exist. I started off the chapter with various utilities to perform wired-based network attacks. This included snmp-based issues as well as DHCP then swithing from there to DOS-based attacks. I then pivoted to wireless attacks. These are very important, as wireless attacks tend to be easier to perform, since they don't require a physical connection into the network like some of the wired-based attacks do. On the wireless side, I showed various utilities to monitor the airways as well as how to attack wireless weaknesses such as WPA, WEP, and of course, social engineering around wireless. I then touched upon some Bluetooth-based utilities for monitoring what Bluetooth devices may...
United States
United Kingdom
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Argentina
Austria
Belgium
Bulgaria
Chile
Colombia
Cyprus
Czechia
Denmark
Ecuador
Egypt
Estonia
Finland
Greece
Hungary
Indonesia
Ireland
Italy
Japan
Latvia
Lithuania
Luxembourg
Malaysia
Malta
Mexico
Netherlands
New Zealand
Norway
Philippines
Poland
Portugal
Romania
Singapore
Slovakia
Slovenia
South Africa
South Korea
Sweden
Switzerland
Taiwan
Thailand
Turkey
Ukraine