As Wi-Fi is becoming popular in China and the world, and Wi-Fi is inherently an insecure network, security awareness must be strengthened. Because Wi-Fi is a diverging network, the wireless network you build may be caught between the occasional hackers. Therefore, whether security auditors or hackers, the use of "war driving," the way to carry a set of special hardware and software tools to detect the wireless network around, and try to find its loopholes. 2g/3g/4g safe? Pseudo Base station analysis? Bulk SMS/Phishing pseudo-base station
? Mass SMS
? SMS Verification
? Forged SMS
? SMS Monitoring
? GPS satellite positioning? CPS Base Station location? WPS WiFi location? Monitoring module positioning? SS7 signaling location? Third-party apps
Other:? Sdr? Wifi? Zigbee? Car-hacking? IOT? SmartDevice? AirLine
--------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------
Hope to your company's enterprise information it architecture and research and development management system, information security and other help. Other articles you might be interested in:
Mobile app app testing and quality management one
Comprehensive Software Testing
An introduction to the SSO Single sign-on solution for well-known ERP vendors
Introduction to software project Risk management
Introduction of enterprise project management
One of intelligent Enterprise and informatization
From the basic qualities of entrepreneurs
Method and practice of quality assurance of agile software
Build efficient research and development and automated operation and maintenance
Introduction to it operation and maintenance monitoring solution
Quality management of it continuous integration
Talent company environment and corporate culture
The Balanced scorecard of enterprise performance management system
Corporate culture, team culture and knowledge sharing
High-Performance Team building
Food chain Company It informatization solution One
If you want to know more software development, system it integration, Enterprise informatization, project management, business management and other information, please follow my subscription number:
Petter Liu
Source: http://www.cnblogs.com/wintersun/
This article is copyright to the author and the blog Park, Welcome to reprint, but without the consent of the author must retain this paragraph, and in the article page obvious location to the original link, otherwise reserves the right to pursue legal responsibility.
The article was also published in my Independent blog-petter Liu blog.
Wireless network security at a glance