Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Vincent Liu.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | TK5103.2 .C23 2007 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000171317 | |
![]() |
Main Library | TK5103.2 .C23 2007 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000147671 |
Browsing Female Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
TK5102.92 .H78 2010 Schaums outlines signals and systems / | TK5103 .Y33 2009 Wireless Communication Systems /by Abhishek Yadav | TK5103.2 .B43 2005 Wireless crash course / | TK5103.2 .C23 2007 Hacking exposed wireless : wireless security secrets & solutions / | TK5103.2 .C36 2008 CWNA : Certified Wireless Network Administrator Official Study Guide (Exam PW0-100) / | TK5103.2 .F87 2016 The future of wireless networks : architectures, protocols, and services / | TK5103.2 .M65 2011 Wireless communications / |
Includes index.
Includes bibliographical references and index.
Case Study: BuzzCorp 2 -- Wireless Setup 2 -- Wireless Risks and Security Controls 2 -- 1 Wireless Security Overview 3 -- Use and Spread of Wireless Technologies 4 -- A Brief History of Wireless Technologies 5 -- Basics of Wireless Technologies 5 -- What Is Wireless? 5 -- Standardization and Regulation 6 -- Further Coverage 7 -- The Risks of Wireless Technologies 7 -- Advances in Wireless Security 10 -- 2 Radio Frequency 13 -- RF Terminology 14 -- Communications Systems 14 -- Radio Frequency Signals 17 -- Electromagnetic Waves 19 -- Units of Measure 20 -- Modulation 24 -- Spread Spectrum and Multiplexing 31 -- RF Hardware 35 -- Antennas 36 -- Amplifiers 41 -- Government Regulations 43 -- Wireless Standards 44 -- Wireless LAN (802.11 a/b/g/n) 45 -- Part II Hacking 802.11 Wireless Technology -- Case Study: Riding the Insecure Airwaves 52 -- 802.11 History 54 -- Wi-Fi vs. 802.11 55 -- 802.11 in a Nutshell 55 -- The 802.11 MAC 55 -- Features of the 802.11 MAC 56 -- 802.11 Packet Types 61 -- Control Packets 61 -- Management Packets 62 -- Data Packets 63 -- Addressing in 802.11 Packets 63 -- Interesting Fields Across Packets 64 -- Finding and Connecting to Wireless Networks 66 -- Locating Wireless Networks 66 -- Connecting to a Wireless Network 67 -- WPA/802.11i Background 68 -- 802.11i Groundwork 69 -- Extensible Authentication Protocol (EAP) 70 -- 802.1X: Bringing EAP to the LAN 76 -- 802.11i: Putting It All Together 78 -- Authentication Using 802.11i 78 -- Confidentiality in 802.11i 84 -- Integrity in 802.11i 87 -- Replay Protection in 802.11i 88 -- 4 802.11 Discovery 91 -- Discovery Basics 92 -- Hardware and Drivers 98 -- Chipsets 101 -- Cards 104 -- Drivers 106 -- Antennas 117 -- GPS 120 -- 5 Scanning and Enumerating 802.11 Networks 125 -- Choosing an Operating System 126 -- Windows 126 -- Linux 126 -- OS X 127 -- Windows Discovery Tools 127 -- NetStumbler 127 -- AiroPeek 140 -- Linux Discovery Tools 146 -- Kismet 147 -- Wellenreiter 153 -- OS X Discovery Tools 154 -- Kismac 154 -- MacStumbler 159 -- iStumbler 160 -- Kismet on OS X 161 -- Online Mapping Services (wigle, .kismac, Google Earth) 161 -- Network Identifiers 162 -- UNIX Sniffers 163 -- Displaying a Saved pcap File 164 -- Capturing Packets in Real-Time 164 -- Wireshark Colors 165 -- 6 Attacking 802.11 Networks 167 -- Basic Types of Attacks 168 -- Security Through Obscurity 168 -- Defeating WEP 173 -- 802.11 Authentication Types 184 -- Shared Key Authentication 184 -- Open Authentication 184 -- 802.1X Authentication 185 -- Advanced Attacks Against WEP 185 -- RC4 Encryption Primer 185 -- Rogue APs 188 -- How Windows Looks for Preferred Networks 189 -- Other KARMA Improvements 190 -- Attacking the Availability of Wireless Networks 194 -- RTS/CTS Attacks 195 -- Miscellaneous Wireless Attacks 198 -- 7 Attacking WPA-protected 802.11 Networks 203 -- Breaking WPA/802.11i 204 -- WPA/802.11i Background 204 -- Attacking WPA/802.11i Enterprise Authentication 212 -- EAP-TLS 213 -- LEAP 214 -- Tunneling EAP Techniques (PEAP/ EAP-TTLS) 216 -- 8 802.11 Defense 225 -- Direct 802.11 Defenses 226 -- WEP 227 -- Deploying WPA/WPA2 Securely 229 -- Avoiding Layer Two Security Altogether 231 -- VPN Protocol Overview 232 -- 802.11 Intrusion Detection 235 -- Configuring PEAP and FreeRadius 236 -- Creating the Certificate Authority 237 -- Creating the RADIUS Server's Certificate 238 -- Configuring FreeRADIUS 240 -- Starting Up the RADIUS Server 244 -- Configuring the AP 244 -- Configuring Windows XP Clients 244 -- Configuring OS X Clients 249 -- Configuring Linux for PEAP Authentication 250 -- Common RADIUS Configuration Problems 251 -- Part III Hacking Additional Wireless Technologies -- Case Study: PriorApproval 256 -- 9 Hacking Hotspots 261 -- Enumeration 263 -- Identifying Hotspot Clients 264 -- Hacking the Infrastructure 267 -- Client Attacks 274 -- 10 The Potential Threat of Bluetooth 287 -- What Is Bluetooth? 288 -- How Far Does Bluetooth Reach? 288 -- What Sort of Functionality Does Bluetooth Have? 289 -- Problems with Bluetooth Security 289 -- 11 Advanced Attacks 333 -- Layer 2 Fragmentation 334 -- Breaking the Silence 336 -- Layer 2 and Layer 3 Resolution 336 -- IP 337 -- UDP 342 -- TCP 342 -- Device Driver Vulnerabilities 353.
1 2
There are no comments on this title.