With the development of mobile devices and network, intelligent mobile phone has become a new paradise for hackers. Imagine, under this environment of everybody holds a smart phone nowadays, nothing is more active than the mobile phone viruses and the vulnerabilities' exploits of software and mobile network. Therefore, to understand and master some practical security tools seems necessary and meaningful.
Good, convenient things will always be popular, get more attention from users, and followed by exposing more problems. The wireless network is one of such new things, which began to catch on around the world due to its application on mobile platform.
First of all, about the author of this book "Johnny Long", he has begun to research using Google to test the potential safety hazards of websites and computers as early as in 1995. What he does has developed and formed today's Google Hacking Techniques - the Google Hacking Database (GHDB) set up by him has been hosted by Exploits-DB now.
Today, wireless network has got very extensive application because of its convenient use and structure, and will eventually cover every corner on the earth, I believe. But due to its broadcast form of data transmission in a wireless network environment, that will inevitably lead to security issues. Of course we can ensure data security by setting different encryption methods in a wireless router, but some loopholes of Wi-Fi network or the router itself can often make every trained hacker be able to crack/hack it.
If someone says you want to use this kind of tool to verify the security of passwords or recover them, that would be a joke, I think. After all, a rule for secure enough password is very simple - Uppercase + Lowercase + Number+ Symbol (and > 8 characters), there is no need of any tool to validate it at all. The same for wireless network password, restoring it is meaningless - just reset the router to default, which is the most efficient way. So, obviously they are designed for passwords cracking only.