Home Page Icon
Home Page
Table of Contents for
Wireless Threats
Close
Wireless Threats
by Seth Fogie, Cyrus Peikari
Maximum Wireless Security
Copyright
About the Authors
We Want to Hear from You!
Introduction
Wireless Fundamentals
Wireless Hardware
Access Points
Linksys WAP11
NetGear ME102
Antennas
Radome-Enclosed Yagi Antenna: HyperLink HG2415Y
Parabolic Grid Antenna: HyperLink HG2419G
SigMax Omni-Directional: Signull SMISMCO10
SigMax Circular Yagi: Signull SMISMCY12
TechnoLab Log Periodic Yagi
Wireless NICs
ORiNOCO PC Card
Handheld Devices
Compaq iPAQ
Summary
Wireless Network Protocols
Inside the 802.11 Standard
Inside the 802.11g Standard
802.11a Versus 802.11b
Understanding HomeRF
Understanding IrDA
Understanding Bluetooth
Summary
Wireless Programming
HTML/XML/XHTML
WAP/WML/WMLScript
Openwave SDK
i-mode
Java
.NET
Summary
WEP Security
WEP Introduction
RC4 Encryption
How RC4 Works
Summary
Wireless Threats
Cracking WEP
WEP Review
Data Analysis
Technical Example
IV Collision
Key Extraction
Summary
Hacking Techniques
Diverse Hacker Attack Methods
Sniffing
Spoofing and Session Hijacking
Understanding Buffer Overflows
Unexpected Input
Denial-of-Service Attacks
Summary
Wireless Attacks
Surveillance
War Driving
Client-to-Client Hacking
Rogue Access Points
Jamming (Denial of Service)
Practical WEP Cracking
Summary
Airborne Viruses
Airborne Viruses
Virus Overview
Virus Prevention
Hostile Web Pages and Scripting
Palm OS
Viruses on Windows CE .NET
Handset Viruses
Summary
Tools of the Trade
Auditing Tools
Ethereal
NetStumbler
Kismet
AirSnort
WEPCrack
Windows XP
AiroPeek NX
Summary
Pocket PC Hacking
Important URLs
Pocket PC Installation
WLAN Drivers
MiniStumbler
CENiffer
Net Force and vxUtil
IBM Wireless Security Auditor
Summary
Wireless Hack Walkthrough
The Test Network
Defining the Goal
Investigation and Discovery
Attack Preparation
Execution
Clean Up
Summary
Wireless Security
Securing the WLAN
Access Point-Based Security Measures
Third-Party Security Methods
Funk’s Steel-Belted Radius
WLAN Protection Enhancements
Summary
Virtual Private Networks
VPN Review
Tunneling
IPsec
L2TP
Attacks Against VPNs
Deploying VPNs in WLANs
Summary
Intrusion Detection Systems
Log File Monitors
Integrity Monitors
IDS Theory
Receiver Operating Characteristic Curves
Hacking Through IDSs
The Future of IDSs
Summary
Wireless Public Key Infrastructure
Public Key Cryptography
Digital Signatures
Certificate Authorities
Wireless PKI Implementation
Transaction Confirmation
Integrity of User Identities
Third-Party Services
WAP PKI
Summary
Appendixes
Decimal/Hex/Binary Conversion Table
WEPCrack Exploit Code Example
GNU General Public License
References
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Summary
Next
Next Chapter
Cracking WEP
Part II: Wireless Threats
IN THIS PART
5
Cracking WEP
6
Hacking Techniques
7
Wireless Attacks
8
Airborne Viruses
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset