Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Step by step wireless hacking
Bookmark Share

Text

Step by step wireless hacking

Efvy Zam - Personal Name;

DAFTAR ISI:
1. Sekilas jaringan wireless
1.1 Teknologi jaringan wireless
1.2 Mekanisme jaringan wireless
1.2.1 Beacon
1.2.2 Service set identifier (SSID)
1.2.3 Channel
1.2.4 Passive scanning
1.2.5 Autentifikasi dan association
1.2.6 Roaming
1.3 Seputar wireless dan hacking

2. Persiapan perang
2.1 Seputar chipset
2.2 Memeriksa chipset
2.3 Membongkar jeroan perangkat wireless

3. War driving
3.1 War driving konvensional
3.2 inSSIDer
3.3 WirelessMon

4. Hidden SSID
4.1 CommView for WiFi

5. Disconnect computer target
5.1 Mengenal NetCut
5.2 Menggunakan NetCut
5.3 NetCut Troubleshooting
5.4 Mengatasi NetCut
5.4.1 NetCut defender
5.4.2 StopCut

6. Denial of service (DOS)

7. Identifikasi keamanan wireless
7.1 Mengenal Initialization Vector (IV)
7.2 WEP
7.3 WPA
7.4 EAP, PEAP, LEAP
7.5 Mengidentifikasi sistem keamanan

8. Membobol password WEP
8.1 CommView for WiFi versi 6
8.2 CommView for WiFi versi 7

9. Membobol password WPA/WPA2

10. Melacak password tersembunyi

11. Menembus MAC address filtering
11.1 Mengetahui MAC address
11.2 Melacak MAC address
11.3 Bypass MAC address filtering

12. Melihat daftar klien access point

13. Menyusup ke computer lain
13.1 Tips mencegah penyusup

14. Mengintip website yang dikunjungi client
14.1 Menghapus driver CommView for WiFi

15. Menyadap password

16. Evil twin attack

17. Default attack

18. Physical attack
18.1 Reset to default
18.2 WiFi Protected Setup (WPS)

19. RF jamming

20. Tips keamanan jaringan wireless


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.84 EFV s/2
00000463
Available
Detail Information
Series Title
--
Call Number
005.84 EFV s
Publisher
Jakarta : Elex Media Komputindo., 2015
Collation
ix, 218 hlm.; ilus.; 21 cm. + 1 CD
Language
Indonesia
ISBN/ISSN
9786020256313
Classification
005.84
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Jaringan komputer
Network Security
Hacking
Specific Detail Info
--
Statement of Responsibility
Efvy Zam
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?