Hacking Exposed Wireless and over one million other books are available for Amazon Kindle. Learn more
Buy Used
+ $3.99 shipping
Used: Like New | Details
Sold by jason_kurt
Condition: :
Comment: Like New. It shows only very slight signs of wear. Our shipping department handles orders in a timely manner
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Exposed Wireless: Wireless Security Secrets & Solutions Paperback – Bargain Price, March 26, 2007

ISBN-10: 0072262583 Edition: 1st

Price: $3.88
12 New from $20.92 17 Used from $2.51
Amazon Price New from Used from
"Please retry"
Paperback, Bargain Price, March 26, 2007
$20.92 $2.51

This is a bargain book and quantities are limited. Bargain books are new but could include a small mark from the publisher and an Amazon.com price sticker identifying them as such. Details

Special Offers and Product Promotions


Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Hacking Exposed
  • Paperback: 386 pages
  • Publisher: McGraw-Hill Osborne Media; 1 edition (March 26, 2007)
  • Language: English
  • ISBN-10: 0072262583
  • ASIN: B007PMB9JM
  • Product Dimensions: 7.4 x 1 x 9.2 inches
  • Shipping Weight: 1.6 pounds
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #3,057,526 in Books (See Top 100 in Books)

Editorial Reviews

About the Author


Johnny Cache received his Masters in Computer Science from the Naval Postgraduate School in 2006. His thesis work, which focused on fingerprinting 802.11 device drivers, won the Gary Kildall award for the most innovative computer science thesis. Johnny wrote his first program on a Tandy 128K color computer sometime in 1988. Since then he has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. He has also released a number of papers related to 802.11 security, and is the author of many wireless tools. Most of his wireless utilities are included in the Airbase suite, available at 802.11mercenary.net.

Vincent Liu , CISSP is the Managing Director at Stach & Liu, a professional services firm providing IT security consulting to the Fortune 500, national law firms, and global financial institutions. Before founding Stach & Liu, Vincent led the Attack & Penetration and Reverse Engineering teams for the Global Security unit at Honeywell International. Prior to that, he was a consultant with the Ernst & Young Advanced Security Centers and an analyst at the National Security Agency. Vincent is a developer for the Metasploit Project and an experienced speaker, having presented his research at conferences including BlackHat, ToorCon, and Microsoft BlueHat. Vincent has been published in interviews, journals, and books with highlights including: Penetration Tester’s Open Source Toolkit; Writing Security Tools and Exploits; Sockets, and Shellcode, Porting, and Coding. Vincent holds a Bachelor of Science and Engineering from the University of Pennsylvania with a major in Computer Science and Engineering and a minor in Psychology.

Customer Reviews

4.2 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See all 6 customer reviews
This would be a very good place to start.
Jay Thom
Attacking `WEP secured WiFi networks' is covered in chapter 6, and I must say, I found this information useful.
Michael Christensen
Overall, I think the book covers the information well.

Most Helpful Customer Reviews

13 of 15 people found the following review helpful By Chris Gates on September 22, 2007
Format: Paperback
I have a ton of those red covered books on the book shelf. The Hacking Exposed series has been good to me and good to every person trying to learn security. So, I was excited to have my new green covered Hacking Exposed Wireless book show up at the house so I could learn some wireless hacking. The first 60 pages or so of background technical content is interesting but not totally necessary to get going with the topic. I do realize to be a good "hacker" you need to understand the technology, but the other HE's have been able to balance giving us the background and still able to use the tools for some hacking action.

I felt that once we finally got into the technical content (starts with 802.11 discovery) that they talked around topics but really didn't cover how to actually "do" anything. There isn't much to running kismet after configuring the one or two lines of the conf file. Then its a simple #kismet or $sudo kismet and it runs. Netstumbler is even easier since you have GUI to help you out and its on Windows and same same with KisMAC on OS X.

The cracking WEP section starts out with saying use an old kernel and the madwifi-old drivers. That may have been great advice when the book was published but it is certainly not useful for the average user today especially since it appears the bugs have been worked out of the new madwifi driver and aircrack-ng. (We do have to take into account that I read the book in Sep 07 and it was published in March 07). The section on using aircrack to break WEP on linux on pages 180-182 was decent but certainly not anything you cant get on the aircrack-ng homepage. A little more content on how we do fake authentication attempts and then why and how we have aireplay send our ARP packets would have been nice.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 8 people found the following review helpful By sixmonkeyjungle on June 11, 2007
Format: Paperback
Maybe it's just me, but it seems like the Hacking Exposed series was in an extended hiatus. It has emerged with a vengeance. Hacking Exposed - Wireless is just one of a series of new Hacking Exposed books and there are more to come throughout the coming months.

While it has been a while since there were new Hacking Exposed books, it seems like it has been even longer since we have had a new book on wireless network security. A topic as rapidly changing and evolving as wireless network technology and security needs updates and new contributions frequently to keep readers informed.

Cache and Liu do a respectable job of bringing the latest and greatest wireless attacks and security measures to the reader. The first chunk of the book- the first 3 chapters- are dedicated to providing a sort of overview of wireless technology and the history or evolution of network communication via RF, but then the book gets down to business.

The authors discuss how to enumerate and identify targets, and how to attack wireless networks, including ways to attack networks 'protected' with WPA encryption. Further into the book, they also provide coverage of wireless security in public hotspots, and a chapter on Bluetooth security.

Hacking Exposed - Wireless covers how attackers use various tools such as Kismet or Airopeek to identify vulnerable wireless networks, and how the Metasploit 3.0 Framework can be used to exploit and attack wireless networks. It also discusses packet injection and DoS (denial-of-service attacks).

Overall, I think the book covers the information well. It provides a good amount of detail about the flaws and weaknesses of wireless networking that can be exploited, and also instructs the reader on security countermeasures to defend against such attacks. Being the most current available also makes this book a must read.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 8 people found the following review helpful By Richard Bejtlich on May 6, 2007
Format: Paperback
When I read and reviewed Wi-Foo: The Secrets of Wireless Hacking three years ago, I was really impressed. Wi-Foo is obviously showing its age now, but a second edition is in the works. I was excited to see Hacking Exposed: Wireless (HE:W), green cover and all, because I hoped it would be just as good as Wi-Foo but covering newer topics. Overall I think the next Wi-Foo will be better than HE:W, but HE:W is currently the most up-to-date book on wireless security available.

Most readers can avoid the first 60 pages or so of HE:W. It seems the different authors wrote the first two chapters, and I doubt most of us need radio, cryptography, and other history lessons. This is supposed to be a Hacking Exposed book, which should mean introducing technologies with a security spin and hands-on exercises from the first page onward. If you want to really understand wireless, read 802.11 Wireless Networks: The Definitive Guide, 2nd Ed by Matthew S Gast, which was my 2006 book of the year.

HE:W begins to be interesting on p 61 with a discussion of "802.11 Packet Types." From this point forward the authors share many unique insights which are either obscure or not well covered elsewhere. I appreciated reading items like the fact that all access points on a channel should honor frames with CTS bits set -- even if the APs belong to different enterprises. Chapter 6 offered great insights on wireless zero configuration in Windows. The authors also demonstrate a powerful ability to explain the workings of various complex security technologies and their weaknesses, e.g., PEAP certificate failure attacks in chapter 7. Chapter 10 offered a story similar to that found in Syngress' Stealing the Network series, where an obsessed hacker exploits Bluetooth on a woman's Mac laptop.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

More About the Authors

Discover books, learn about writers, read author blogs, and more.

What Other Items Do Customers Buy After Viewing This Item?