Frank Thornton (Owner, Blackthorn Systems, New Hampshire, USA), Chris Lanthem (Security/Network Engineer for NSight Tech
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system...
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas t...
Chris Hurley (Senior Penetration Tester, Washington, DC, USA), Russ Rogers, Frank Thornton (Owner, Blackthorn Systems, N
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source...
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by prof...