Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Vincent Liu.

By: Cache, JohnnyContributor(s): Liu, VincentMaterial type: TextTextPublisher: New York, NY : McGraw-Hill, c2007Description: xxv, 387 p. : ill. ; 24 cmISBN: 9780072262582 (pbk.); 0072262583 (pbk.)Subject(s): Wireless communication systems -- Security measures | Wireless LANs -- Security measuresDDC classification: 621.382 LOC classification: TK5103.2 | .C23 2007Online resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
Case Study: BuzzCorp Wireless Setup Wireless Risks and Security Controls Wireless Security Overview Use and Spread of Wireless Technologies A Brief History of Wireless Technologies Basics of Wireless Technologies What Is Wireless? Standardization and Regulation Further Coverage The Risks of Wireless Technologies Advances in Wireless Security Radio Frequency RF Terminology Communications Systems Radio Frequency Signals Electromagnetic Waves Units of Measure Modulation Spread Spectrum and Multiplexing RF Hardware Antennas Amplifiers Government Regulations Wireless Standards Wireless LAN (802.11 a/b/g/n) Hacking 802.11 Wireless Technology -- Case Study: Riding the Insecure Airwaves 802.11 History Wi-Fi vs. 802.11 802.11 in a Nutshell The 802.11 MAC Features of the 802.11 MAC 802.11 Packet Types Control Packets Management Packets Data Packets Addressing in 802.11 Packets Interesting Fields Across Packets Finding and Connecting to Wireless Networks Locating Wireless Networks Connecting to a Wireless Network WPA/802.11i Background 802.11i Groundwork Extensible Authentication Protocol (EAP) 802.1X: Bringing EAP to the LAN 802.11i: Putting It All Together Authentication Using 802.11i Confidentiality in 802.11i Integrity in 802.11i Replay Protection in 802.11i 802.11 Discovery Discovery Basics Hardware and Drivers Chipsets Cards Drivers Antennas GPS Scanning and Enumerating 802.11 Networks Choosing an Operating System Windows Linux OS X Windows Discovery Tools NetStumbler AiroPeek Linux Discovery Tools Kismet Wellenreiter OS X Discovery Tools Kismac MacStumbler iStumbler Kismet on OS X Online Mapping Services (wigle, .kismac, Google Earth) Network Identifiers UNIX Sniffers Displaying a Saved pcap File Capturing Packets in Real-Time Wireshark Colors Attacking 802.11 Networks Basic Types of Attacks Security Through Obscurity Defeating WEP 802.11 Authentication Types Shared Key Authentication Open Authentication 802.1X Authentication Advanced Attacks Against WEP RC4 Encryption Primer Rogue APs How Windows Looks for Preferred Networks Other KARMA Improvements Attacking the Availability of Wireless Networks RTS/CTS Attacks Miscellaneous Wireless Attacks Attacking WPA-protected 802.11 Networks Breaking WPA/802.11i WPA/802.11i Background Attacking WPA/802.11i Enterprise Authentication EAP-TLS LEAP Tunneling EAP Techniques (PEAP/ EAP-TTLS) 802.11 Defense Direct 802.11 Defenses WEP Deploying WPA/WPA2 Securely Avoiding Layer Two Security Altogether VPN Protocol Overview 802.11 Intrusion Detection Configuring PEAP and FreeRadius Creating the Certificate Authority Creating the RADIUS Server's Certificate Configuring FreeRADIUS Starting Up the RADIUS Server Configuring the AP Configuring Windows XP Clients Configuring OS X Clients Configuring Linux for PEAP Authentication Common RADIUS Configuration Problems Hacking Additional Wireless Technologies -- Case Study: PriorApproval Hacking Hotspots Enumeration Identifying Hotspot Clients Hacking the Infrastructure Client Attacks The Potential Threat of Bluetooth What Is Bluetooth? How Far Does Bluetooth Reach? What Sort of Functionality Does Bluetooth Have? Problems with Bluetooth Security Advanced Attacks Layer 2 Fragmentation Breaking the Silence Layer 2 and Layer 3 Resolution IP UDP TCP Device Driver Vulnerabilities
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)

Includes index.

Includes bibliographical references and index.

Case Study: BuzzCorp 2 -- Wireless Setup 2 -- Wireless Risks and Security Controls 2 -- 1 Wireless Security Overview 3 -- Use and Spread of Wireless Technologies 4 -- A Brief History of Wireless Technologies 5 -- Basics of Wireless Technologies 5 -- What Is Wireless? 5 -- Standardization and Regulation 6 -- Further Coverage 7 -- The Risks of Wireless Technologies 7 -- Advances in Wireless Security 10 -- 2 Radio Frequency 13 -- RF Terminology 14 -- Communications Systems 14 -- Radio Frequency Signals 17 -- Electromagnetic Waves 19 -- Units of Measure 20 -- Modulation 24 -- Spread Spectrum and Multiplexing 31 -- RF Hardware 35 -- Antennas 36 -- Amplifiers 41 -- Government Regulations 43 -- Wireless Standards 44 -- Wireless LAN (802.11 a/b/g/n) 45 -- Part II Hacking 802.11 Wireless Technology -- Case Study: Riding the Insecure Airwaves 52 -- 802.11 History 54 -- Wi-Fi vs. 802.11 55 -- 802.11 in a Nutshell 55 -- The 802.11 MAC 55 -- Features of the 802.11 MAC 56 -- 802.11 Packet Types 61 -- Control Packets 61 -- Management Packets 62 -- Data Packets 63 -- Addressing in 802.11 Packets 63 -- Interesting Fields Across Packets 64 -- Finding and Connecting to Wireless Networks 66 -- Locating Wireless Networks 66 -- Connecting to a Wireless Network 67 -- WPA/802.11i Background 68 -- 802.11i Groundwork 69 -- Extensible Authentication Protocol (EAP) 70 -- 802.1X: Bringing EAP to the LAN 76 -- 802.11i: Putting It All Together 78 -- Authentication Using 802.11i 78 -- Confidentiality in 802.11i 84 -- Integrity in 802.11i 87 -- Replay Protection in 802.11i 88 -- 4 802.11 Discovery 91 -- Discovery Basics 92 -- Hardware and Drivers 98 -- Chipsets 101 -- Cards 104 -- Drivers 106 -- Antennas 117 -- GPS 120 -- 5 Scanning and Enumerating 802.11 Networks 125 -- Choosing an Operating System 126 -- Windows 126 -- Linux 126 -- OS X 127 -- Windows Discovery Tools 127 -- NetStumbler 127 -- AiroPeek 140 -- Linux Discovery Tools 146 -- Kismet 147 -- Wellenreiter 153 -- OS X Discovery Tools 154 -- Kismac 154 -- MacStumbler 159 -- iStumbler 160 -- Kismet on OS X 161 -- Online Mapping Services (wigle, .kismac, Google Earth) 161 -- Network Identifiers 162 -- UNIX Sniffers 163 -- Displaying a Saved pcap File 164 -- Capturing Packets in Real-Time 164 -- Wireshark Colors 165 -- 6 Attacking 802.11 Networks 167 -- Basic Types of Attacks 168 -- Security Through Obscurity 168 -- Defeating WEP 173 -- 802.11 Authentication Types 184 -- Shared Key Authentication 184 -- Open Authentication 184 -- 802.1X Authentication 185 -- Advanced Attacks Against WEP 185 -- RC4 Encryption Primer 185 -- Rogue APs 188 -- How Windows Looks for Preferred Networks 189 -- Other KARMA Improvements 190 -- Attacking the Availability of Wireless Networks 194 -- RTS/CTS Attacks 195 -- Miscellaneous Wireless Attacks 198 -- 7 Attacking WPA-protected 802.11 Networks 203 -- Breaking WPA/802.11i 204 -- WPA/802.11i Background 204 -- Attacking WPA/802.11i Enterprise Authentication 212 -- EAP-TLS 213 -- LEAP 214 -- Tunneling EAP Techniques (PEAP/ EAP-TTLS) 216 -- 8 802.11 Defense 225 -- Direct 802.11 Defenses 226 -- WEP 227 -- Deploying WPA/WPA2 Securely 229 -- Avoiding Layer Two Security Altogether 231 -- VPN Protocol Overview 232 -- 802.11 Intrusion Detection 235 -- Configuring PEAP and FreeRadius 236 -- Creating the Certificate Authority 237 -- Creating the RADIUS Server's Certificate 238 -- Configuring FreeRADIUS 240 -- Starting Up the RADIUS Server 244 -- Configuring the AP 244 -- Configuring Windows XP Clients 244 -- Configuring OS X Clients 249 -- Configuring Linux for PEAP Authentication 250 -- Common RADIUS Configuration Problems 251 -- Part III Hacking Additional Wireless Technologies -- Case Study: PriorApproval 256 -- 9 Hacking Hotspots 261 -- Enumeration 263 -- Identifying Hotspot Clients 264 -- Hacking the Infrastructure 267 -- Client Attacks 274 -- 10 The Potential Threat of Bluetooth 287 -- What Is Bluetooth? 288 -- How Far Does Bluetooth Reach? 288 -- What Sort of Functionality Does Bluetooth Have? 289 -- Problems with Bluetooth Security 289 -- 11 Advanced Attacks 333 -- Layer 2 Fragmentation 334 -- Breaking the Silence 336 -- Layer 2 and Layer 3 Resolution 336 -- IP 337 -- UDP 342 -- TCP 342 -- Device Driver Vulnerabilities 353.

1 2

There are no comments on this title.

to post a comment.