Cache, Johnny.

Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Vincent Liu. - New York, NY : McGraw-Hill, c2007. - xxv, 387 p. : ill. ; 24 cm.

Includes index.

Includes bibliographical references and index.

Case Study: BuzzCorp Wireless Setup Wireless Risks and Security Controls Wireless Security Overview Use and Spread of Wireless Technologies A Brief History of Wireless Technologies Basics of Wireless Technologies What Is Wireless? Standardization and Regulation Further Coverage The Risks of Wireless Technologies Advances in Wireless Security Radio Frequency RF Terminology Communications Systems Radio Frequency Signals Electromagnetic Waves Units of Measure Modulation Spread Spectrum and Multiplexing RF Hardware Antennas Amplifiers Government Regulations Wireless Standards Wireless LAN (802.11 a/b/g/n) Hacking 802.11 Wireless Technology -- Case Study: Riding the Insecure Airwaves 802.11 History Wi-Fi vs. 802.11 802.11 in a Nutshell The 802.11 MAC Features of the 802.11 MAC 802.11 Packet Types Control Packets Management Packets Data Packets Addressing in 802.11 Packets Interesting Fields Across Packets Finding and Connecting to Wireless Networks Locating Wireless Networks Connecting to a Wireless Network WPA/802.11i Background 802.11i Groundwork Extensible Authentication Protocol (EAP) 802.1X: Bringing EAP to the LAN 802.11i: Putting It All Together Authentication Using 802.11i Confidentiality in 802.11i Integrity in 802.11i Replay Protection in 802.11i 802.11 Discovery Discovery Basics Hardware and Drivers Chipsets Cards Drivers Antennas GPS Scanning and Enumerating 802.11 Networks Choosing an Operating System Windows Linux OS X Windows Discovery Tools NetStumbler AiroPeek Linux Discovery Tools Kismet Wellenreiter OS X Discovery Tools Kismac MacStumbler iStumbler Kismet on OS X Online Mapping Services (wigle, .kismac, Google Earth) Network Identifiers UNIX Sniffers Displaying a Saved pcap File Capturing Packets in Real-Time Wireshark Colors Attacking 802.11 Networks Basic Types of Attacks Security Through Obscurity Defeating WEP 802.11 Authentication Types Shared Key Authentication Open Authentication 802.1X Authentication Advanced Attacks Against WEP RC4 Encryption Primer Rogue APs How Windows Looks for Preferred Networks Other KARMA Improvements Attacking the Availability of Wireless Networks RTS/CTS Attacks Miscellaneous Wireless Attacks Attacking WPA-protected 802.11 Networks Breaking WPA/802.11i WPA/802.11i Background Attacking WPA/802.11i Enterprise Authentication EAP-TLS LEAP Tunneling EAP Techniques (PEAP/ EAP-TTLS) 802.11 Defense Direct 802.11 Defenses WEP Deploying WPA/WPA2 Securely Avoiding Layer Two Security Altogether VPN Protocol Overview 802.11 Intrusion Detection Configuring PEAP and FreeRadius Creating the Certificate Authority Creating the RADIUS Server's Certificate Configuring FreeRADIUS Starting Up the RADIUS Server Configuring the AP Configuring Windows XP Clients Configuring OS X Clients Configuring Linux for PEAP Authentication Common RADIUS Configuration Problems Hacking Additional Wireless Technologies -- Case Study: PriorApproval Hacking Hotspots Enumeration Identifying Hotspot Clients Hacking the Infrastructure Client Attacks The Potential Threat of Bluetooth What Is Bluetooth? How Far Does Bluetooth Reach? What Sort of Functionality Does Bluetooth Have? Problems with Bluetooth Security Advanced Attacks Layer 2 Fragmentation Breaking the Silence Layer 2 and Layer 3 Resolution IP UDP TCP Device Driver Vulnerabilities 2 -- 2 -- 2 -- 1 3 -- 4 -- 5 -- 5 -- 5 -- 6 -- 7 -- 7 -- 10 -- 2 13 -- 14 -- 14 -- 17 -- 19 -- 20 -- 24 -- 31 -- 35 -- 36 -- 41 -- 43 -- 44 -- 45 -- Part II 52 -- 54 -- 55 -- 55 -- 55 -- 56 -- 61 -- 61 -- 62 -- 63 -- 63 -- 64 -- 66 -- 66 -- 67 -- 68 -- 69 -- 70 -- 76 -- 78 -- 78 -- 84 -- 87 -- 88 -- 4 91 -- 92 -- 98 -- 101 -- 104 -- 106 -- 117 -- 120 -- 5 125 -- 126 -- 126 -- 126 -- 127 -- 127 -- 127 -- 140 -- 146 -- 147 -- 153 -- 154 -- 154 -- 159 -- 160 -- 161 -- 161 -- 162 -- 163 -- 164 -- 164 -- 165 -- 6 167 -- 168 -- 168 -- 173 -- 184 -- 184 -- 184 -- 185 -- 185 -- 185 -- 188 -- 189 -- 190 -- 194 -- 195 -- 198 -- 7 203 -- 204 -- 204 -- 212 -- 213 -- 214 -- 216 -- 8 225 -- 226 -- 227 -- 229 -- 231 -- 232 -- 235 -- 236 -- 237 -- 238 -- 240 -- 244 -- 244 -- 244 -- 249 -- 250 -- 251 -- Part III 256 -- 9 261 -- 263 -- 264 -- 267 -- 274 -- 10 287 -- 288 -- 288 -- 289 -- 289 -- 11 333 -- 334 -- 336 -- 336 -- 337 -- 342 -- 342 -- 353.

9780072262582 (pbk.) 0072262583 (pbk.)

2007035664


Wireless communication systems--Security measures.
Wireless LANs--Security measures.

TK5103.2 / .C23 2007

621.382