Issue 17 - June 2011 issue of ClubHack Magazine released.

In this issue we'll be covering topics such as Penetration testing your own Wireless Network in Tech Gyan, UNIX and Windows based Wi-Fi tools in Tool Gyan, User Agents in Moms Guide, Forensics with Matriux in MatriuxVibhag, and many more
By: Sagar Nangare
 
June 15, 2011 - PRLog -- Can you cage a Wi-Fi signal? You may or may not... discover it for yourself in this issue.
This issue is especially dedicated to wireless network security. Learn about attacks and penetration testing on wireless networks.Additionally we have some demos for the same and best practises for Wi-Fi network security. We are sure these would be of great value to network admins.By understanding the methods used by attackers in compromising Wi-Fi networks, network admins can redefine their strategies required to secure their networks.
This issue covers Pentesting Your Wireless in Tech Gyan, Best Practises for Wi-Fi Networks in Moms Guide, Wi-Fi Tools in Tool Gyan, Copyright and Cyberspace in Legal Gyan and Forensics with Matriux - Part 2 in MatriuxVibhag.

a. Pentesting your own Wireless Network (Tech Gyan)
This article teaches you how to perform penetration testing a wireless network. You will understand the concept like IEEE 802.11 which is a set of protocols used for implementing wireless LAN, encryption & authentication used in IEEE 802.11 Environment. Also different Wireless Architectures & Implementations like Wi-Fi Network at Home, Corporate / Enterprise Network. You will learn pentesting by example described in an article.

b. Wi-Fi Tools (Tool Gyan)
In this section you will learn important Wi-Fi tools built in UNIX and Windows. In UNIX you will come to know about interesting UNIX operating system called Backtrack and its tools like Kismet, Air Crack, Airsnort, CowPatty, FakeAP, Karma, GerixWiFi Cracker. Backtrack which is a UNIX distribution for Ethical vulnerability assessment & penetration testing (VA&PT) has an impressive collection of tools for reconnaissance, vulnerability assessment, cracking keys & passwords, penetration testing etc.
Windows offers many Wi-Fi tools, from that author is describing most popular tools like NetStumbler. You will learn how you smart phone can be used for Wi-Fi scanning. For that tools like WiGLEWifi War driving and WiFi Buddy are explained in the article.  
c.Wireless Security – Best Practices (Mom's Guide)
This article is about different kind of Best Practices that should be followed when using Wireless LAN.
In this article concept of wireless LAN is explained. You will understand different major issues with WLAN, what actually makes a wireless LAN secure, what precautions you have to do to make your wireless LAN secure at home and at corporate/enterprise network.

d. Forensics with Matriux - Part 2 (MatriuxVibhag)
In the Part of the article on Forensics with Matriux, we had highlighted the forensic acquisition techniques using Matriux distribution. In this second part, we will cover the tools that focus on analysis techniques.
Forensic Analysis techniques can be used to discover Deleted Files, Cloaked files, Encrypted files, Fragmented files, PDF, Browser, Virtualization, Memory and etc.

e. Copyright and Cyberspace (Legal Gyan)
In today’s cyberspace copyright issues are taking control on how we distribute and collect information/data from internet. This article is explaining concept of Copyright with an example called Revati, computer software which reproduce content. You will come to know concept of Copyright Infringement and what punishments are specified for Copyright Infringement. Also this article covered Computer Software, Computer Database & Law, and Essential elements of “computer database”.

Click here to download magazine: http://chmag.in/issue/jun2011.pdf
To read more computer security articles, keep visiting: http://chmag.in

# # #

In India we were waiting to see any 'hacking' magazine to happen and the wait was getting little longer. So finally ClubHack decided to come up with its own 1st Indian "Hacking" Magazine called CHmag. Visit our sites: http://www.clubhack.com & http://csoindia.org
End
Source:Sagar Nangare
Email:***@chmag.in Email Verified
Tags:Clubhack, Chmag, first Indian hacking magazine, Copyright Infringement, Revati
Industry:Security, Wireless, Computers
Location:India
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
CHMag PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share