BEGIN PGP SIGNED MESSAGE Hash: SHA1 For the past 12 months, Jon Ellch, Vinnie Liu and I have been re-writing the Hacking Exposed Wireless book, producing the 2nd edition. This is a complete re-write of the book, adding me as an author where I contributed several chapters on Bluetooth, ZigBee and DECT wireless technology, a chapter on exploiting Windows Vista/7 wireless features, and tech-review for the other authors. I'm especially happy about this content because I feel that it is the first time a book has demonstrated attack techniques against wireless technology including and beyond 802.11. Here is a smattering of topics: 802.11 Hardware Solutions, Building an Attack Platform, Breaking WPA2-PSK, Breaking Enterprise WPA, Exploiting EAP, Exploiting DNS over Wireless, WLAN Man-in-the-Middle Attacks, Exploiting Client Software Updates, Web Hacking and WiFi, Leveraging Compromised Clients, Active and Passive Bluetooth Device Discovery, Sniffing Bluetooth Networks, Leveraging Software Defined Radio for Wireless Attacks, Manipulating Bluetooth Identities, Abusing Bluetooth Profiles, ZigBee’s Security Model, Exploiting ZigBee with KillerBee, ZigBee Hardware Exploits, Exploiting DECT Pairing and Authentication, DECT Audio Eavesdropping Attacks and Effectively Scoping a Wireless Security Engagement. While writing the book, we realized there was more content that we wanted to cover than we could accommodate given our page count limit. As a result, much of the detailed content behind how radio frequency, 802.11 and Bluetooth work have been moved to free online chapters, which you can grab at our companion website:http://www.hackingexposedwireless.com Chapter 1 "Hacking 802.11 Wireless Technology" is also available as a free sample chapter at the companion website (above), as well as extra tools, scripts, patches, high-resolution images and more. You can find the book at Amazon (Amazon.com: Hacking Exposed Wireless, Second Edition (9780071666619): Johnny Cache, Joshua Wright, Vincent Liu: Books) or your favorite reseller. There is also a Kindle edition if you prefer e-books like I do. If you feel so moved after buying the book, we always appreciate reviews and feedback! It's been a pleasure working with all of my past students, and a lot of the content in this book was directly influenced by your questions, suggestions and ideas. Thank you for all your support. - -Josh BEGIN PGP SIGNATURE Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - Enigmail: A simple interface for OpenPGP email security iEYEARECAAYFAkx+S4IACgkQapC4Te3oxYwa5gCeO8x0sNh6/B3yXgh5jmybBxmF J5YAniIV51sQX6UYINy65cXixwFlecsj =YoF9 END PGP SIGNATURE