This guide details how to undertake wireless (radio) profiling during a penetration test. Radio is one of the frequently forgotten mediums of information leakage. Whether it be two-way radios, wireless headsets, cordless phones, or other wireless devices, these are all mediums via which information can leak.
Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. In order to stop attacks you need to think like an attacker. This book details all the methods employed by attackers to exploit radio signal information leakage. It also includes tips for reducing radio information leakage and actual case studies describing how information leaked can be used to attack computer systems. This book is the go-to resource for penetration testing and radio profiling.