Avatar (Fabio Alessandro Locati|Fale)'s blog

Wireless Reconnaissance in Penetration Testing by Matthew Neely, Alex Hamerstone, Chris Sanyk (Elsevier/Syngress)

March 19, 2013

When someone says the word “wireless”, 99.9% of the audience thinks at the Wireless Networking Technologies (802.11 family). Very few think to the Bluetooth. Even fewer people think to all the other technologies that use wireless technology to work, such as cordless phone, guard radios, headsets, wireless camera etc. This book embrace the last point of view.

The first chapter provides basic information and motivation for Wireless Profiling.

The chapter 2 provides the reader with all the information she needs to be able to understand the wireless technology and it’s usage.

Read More

Metasploit by Mati Aharoni, Devon Kearns, Jim O'Gorman, David Kennedy (No Starch Press)

March 12, 2013

Metasploit is the most common and complete framework for testing security. Metasploit isĀ an entire suite of tools and methodologies designed for testing the security of computers and networks.

The book is written for both experienced penetration tester and people new to the security field. For the first group, one of the most interesting thing is the explanation of the rules and ideas that formed the Penetration Test Execution Standard, while for users new to the field, is really interesting what can be done and how.

Read More