We are now done with Day 7, so let us recap. Making sure the infrastructure if protected is important to any customer/company, so as penetration testers, it is our job to find issues that may exist. I started off the chapter with various utilities to perform wired-based network attacks. This included snmp-based issues as well as DHCP then swithing from there to DOS-based attacks. I then pivoted to wireless attacks. These are very important, as wireless attacks tend to be easier to perform, since they don't require a physical connection into the network like some of the wired-based attacks do. On the wireless side, I showed various utilities to monitor the airways as well as how to attack wireless weaknesses such as WPA, WEP, and of course, social engineering around wireless. I then touched upon some Bluetooth-based utilities for monitoring what Bluetooth devices may...
Germany
Slovakia
Canada
Brazil
Singapore
Hungary
Philippines
Mexico
Thailand
Ukraine
Luxembourg
Estonia
Lithuania
Norway
Chile
United States
Great Britain
India
Spain
South Korea
Ecuador
Colombia
Taiwan
Switzerland
Indonesia
Cyprus
Denmark
Finland
Poland
Malta
Czechia
New Zealand
Austria
Turkey
France
Sweden
Italy
Egypt
Belgium
Portugal
Slovenia
Ireland
Romania
Greece
Argentina
Malaysia
South Africa
Netherlands
Bulgaria
Latvia
Australia
Japan
Russia