TY - BOOK AU - Cache,Johnny AU - Liu,Vincent TI - Hacking exposed wireless: wireless security secrets & solutions SN - 9780072262582 (pbk.) AV - TK5103.2 .C23 2007 U1 - 621.382 22 PY - 2007/// CY - New York, NY PB - McGraw-Hill KW - Wireless communication systems KW - Security measures KW - Wireless LANs N1 - Includes index; Includes bibliographical references and index; Case Study: BuzzCorp; 2 --; Wireless Setup; 2 --; Wireless Risks and Security Controls; 2 --; 1; Wireless Security Overview; 3 --; Use and Spread of Wireless Technologies; 4 --; A Brief History of Wireless Technologies; 5 --; Basics of Wireless Technologies; 5 --; What Is Wireless?; 5 --; Standardization and Regulation; 6 --; Further Coverage; 7 --; The Risks of Wireless Technologies; 7 --; Advances in Wireless Security; 10 --; 2; Radio Frequency; 13 --; RF Terminology; 14 --; Communications Systems; 14 --; Radio Frequency Signals; 17 --; Electromagnetic Waves; 19 --; Units of Measure; 20 --; Modulation; 24 --; Spread Spectrum and Multiplexing; 31 --; RF Hardware; 35 --; Antennas; 36 --; Amplifiers; 41 --; Government Regulations; 43 --; Wireless Standards; 44 --; Wireless LAN (802.11 a/b/g/n); 45 --; Part II; Hacking 802.11 Wireless Technology --; Case Study: Riding the Insecure Airwaves; 52 --; 802.11 History; 54 --; Wi-Fi vs. 802.11; 55 --; 802.11 in a Nutshell; 55 --; The 802.11 MAC; 55 --; Features of the 802.11 MAC; 56 --; 802.11 Packet Types; 61 --; Control Packets; 61 --; Management Packets; 62 --; Data Packets; 63 --; Addressing in 802.11 Packets; 63 --; Interesting Fields Across Packets; 64 --; Finding and Connecting to Wireless Networks; 66 --; Locating Wireless Networks; 66 --; Connecting to a Wireless Network; 67 --; WPA/802.11i Background; 68 --; 802.11i Groundwork; 69 --; Extensible Authentication Protocol (EAP); 70 --; 802.1X: Bringing EAP to the LAN; 76 --; 802.11i: Putting It All Together; 78 --; Authentication Using 802.11i; 78 --; Confidentiality in 802.11i; 84 --; Integrity in 802.11i; 87 --; Replay Protection in 802.11i; 88 --; 4; 802.11 Discovery; 91 --; Discovery Basics; 92 --; Hardware and Drivers; 98 --; Chipsets; 101 --; Cards; 104 --; Drivers; 106 --; Antennas; 117 --; GPS; 120 --; 5; Scanning and Enumerating 802.11 Networks; 125 --; Choosing an Operating System; 126 --; Windows; 126 --; Linux; 126 --; OS X; 127 --; Windows Discovery Tools; 127 --; NetStumbler; 127 --; AiroPeek; 140 --; Linux Discovery Tools; 146 --; Kismet; 147 --; Wellenreiter; 153 --; OS X Discovery Tools; 154 --; Kismac; 154 --; MacStumbler; 159 --; iStumbler; 160 --; Kismet on OS X; 161 --; Online Mapping Services (wigle, .kismac, Google Earth); 161 --; Network Identifiers; 162 --; UNIX Sniffers; 163 --; Displaying a Saved pcap File; 164 --; Capturing Packets in Real-Time; 164 --; Wireshark Colors; 165 --; 6; Attacking 802.11 Networks; 167 --; Basic Types of Attacks; 168 --; Security Through Obscurity; 168 --; Defeating WEP; 173 --; 802.11 Authentication Types; 184 --; Shared Key Authentication; 184 --; Open Authentication; 184 --; 802.1X Authentication; 185 --; Advanced Attacks Against WEP; 185 --; RC4 Encryption Primer; 185 --; Rogue APs; 188 --; How Windows Looks for Preferred Networks; 189 --; Other KARMA Improvements; 190 --; Attacking the Availability of Wireless Networks; 194 --; RTS/CTS Attacks; 195 --; Miscellaneous Wireless Attacks; 198 --; 7; Attacking WPA-protected 802.11 Networks; 203 --; Breaking WPA/802.11i; 204 --; WPA/802.11i Background; 204 --; Attacking WPA/802.11i Enterprise Authentication; 212 --; EAP-TLS; 213 --; LEAP; 214 --; Tunneling EAP Techniques (PEAP/ EAP-TTLS); 216 --; 8; 802.11 Defense; 225 --; Direct 802.11 Defenses; 226 --; WEP; 227 --; Deploying WPA/WPA2 Securely; 229 --; Avoiding Layer Two Security Altogether; 231 --; VPN Protocol Overview; 232 --; 802.11 Intrusion Detection; 235 --; Configuring PEAP and FreeRadius; 236 --; Creating the Certificate Authority; 237 --; Creating the RADIUS Server's Certificate; 238 --; Configuring FreeRADIUS; 240 --; Starting Up the RADIUS Server; 244 --; Configuring the AP; 244 --; Configuring Windows XP Clients; 244 --; Configuring OS X Clients; 249 --; Configuring Linux for PEAP Authentication; 250 --; Common RADIUS Configuration Problems; 251 --; Part III; Hacking Additional Wireless Technologies --; Case Study: PriorApproval; 256 --; 9; Hacking Hotspots; 261 --; Enumeration; 263 --; Identifying Hotspot Clients; 264 --; Hacking the Infrastructure; 267 --; Client Attacks; 274 --; 10; The Potential Threat of Bluetooth; 287 --; What Is Bluetooth?; 288 --; How Far Does Bluetooth Reach?; 288 --; What Sort of Functionality Does Bluetooth Have?; 289 --; Problems with Bluetooth Security; 289 --; 11; Advanced Attacks; 333 --; Layer 2 Fragmentation; 334 --; Breaking the Silence; 336 --; Layer 2 and Layer 3 Resolution; 336 --; IP; 337 --; UDP; 342 --; TCP; 342 --; Device Driver Vulnerabilities; 353 UR - http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-b.html UR - http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-d.html UR - http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-t.html ER -