000 05951cam a2200361 a 4500
001 u8308
003 SA-PMU
005 20210418123828.0
008 070827s2007 nyua 001 0 eng
010 _a 2007035664
040 _aDLC
_beng
_cDLC
_dYDX
_dDPE
_dXVF
_dBAKER
_dIXA
_dQBX
_dUKM
_dOMP
_dYDXCP
_dBTCTA
_dUUS
_dMVCLD
_dHEBIS
_dHDC
_dOCLCF
_dOCLCO
020 _a9780072262582 (pbk.)
020 _a0072262583 (pbk.)
035 _a(OCoLC)123415793
_z(OCoLC)76935566
050 0 0 _aTK5103.2
_b.C23 2007
082 0 0 _a621.382
_222
100 1 _aCache, Johnny.
245 1 0 _aHacking exposed wireless :
_bwireless security secrets & solutions /
_cJohnny Cache, Vincent Liu.
260 _aNew York, NY :
_bMcGraw-Hill,
_cc2007.
300 _axxv, 387 p. :
_bill. ;
_c24 cm.
500 _aIncludes index.
504 _aIncludes bibliographical references and index.
505 0 0 _tCase Study: BuzzCorp
_g2 --
_tWireless Setup
_g2 --
_tWireless Risks and Security Controls
_g2 --
_g1
_tWireless Security Overview
_g3 --
_tUse and Spread of Wireless Technologies
_g4 --
_tA Brief History of Wireless Technologies
_g5 --
_tBasics of Wireless Technologies
_g5 --
_tWhat Is Wireless?
_g5 --
_tStandardization and Regulation
_g6 --
_tFurther Coverage
_g7 --
_tThe Risks of Wireless Technologies
_g7 --
_tAdvances in Wireless Security
_g10 --
_g2
_tRadio Frequency
_g13 --
_tRF Terminology
_g14 --
_tCommunications Systems
_g14 --
_tRadio Frequency Signals
_g17 --
_tElectromagnetic Waves
_g19 --
_tUnits of Measure
_g20 --
_tModulation
_g24 --
_tSpread Spectrum and Multiplexing
_g31 --
_tRF Hardware
_g35 --
_tAntennas
_g36 --
_tAmplifiers
_g41 --
_tGovernment Regulations
_g43 --
_tWireless Standards
_g44 --
_tWireless LAN (802.11 a/b/g/n)
_g45 --
_gPart II
_tHacking 802.11 Wireless Technology --
_tCase Study: Riding the Insecure Airwaves
_g52 --
_t802.11 History
_g54 --
_tWi-Fi vs. 802.11
_g55 --
_t802.11 in a Nutshell
_g55 --
_tThe 802.11 MAC
_g55 --
_tFeatures of the 802.11 MAC
_g56 --
_t802.11 Packet Types
_g61 --
_tControl Packets
_g61 --
_tManagement Packets
_g62 --
_tData Packets
_g63 --
_tAddressing in 802.11 Packets
_g63 --
_tInteresting Fields Across Packets
_g64 --
_tFinding and Connecting to Wireless Networks
_g66 --
_tLocating Wireless Networks
_g66 --
_tConnecting to a Wireless Network
_g67 --
_tWPA/802.11i Background
_g68 --
_t802.11i Groundwork
_g69 --
_tExtensible Authentication Protocol (EAP)
_g70 --
_t802.1X: Bringing EAP to the LAN
_g76 --
_t802.11i: Putting It All Together
_g78 --
_tAuthentication Using 802.11i
_g78 --
_tConfidentiality in 802.11i
_g84 --
_tIntegrity in 802.11i
_g87 --
_tReplay Protection in 802.11i
_g88 --
_g4
_t802.11 Discovery
_g91 --
_tDiscovery Basics
_g92 --
_tHardware and Drivers
_g98 --
_tChipsets
_g101 --
_tCards
_g104 --
_tDrivers
_g106 --
_tAntennas
_g117 --
_tGPS
_g120 --
_g5
_tScanning and Enumerating 802.11 Networks
_g125 --
_tChoosing an Operating System
_g126 --
_tWindows
_g126 --
_tLinux
_g126 --
_tOS X
_g127 --
_tWindows Discovery Tools
_g127 --
_tNetStumbler
_g127 --
_tAiroPeek
_g140 --
_tLinux Discovery Tools
_g146 --
_tKismet
_g147 --
_tWellenreiter
_g153 --
_tOS X Discovery Tools
_g154 --
_tKismac
_g154 --
_tMacStumbler
_g159 --
_tiStumbler
_g160 --
_tKismet on OS X
_g161 --
_tOnline Mapping Services (wigle, .kismac, Google Earth)
_g161 --
_tNetwork Identifiers
_g162 --
_tUNIX Sniffers
_g163 --
_tDisplaying a Saved pcap File
_g164 --
_tCapturing Packets in Real-Time
_g164 --
_tWireshark Colors
_g165 --
_g6
_tAttacking 802.11 Networks
_g167 --
_tBasic Types of Attacks
_g168 --
_tSecurity Through Obscurity
_g168 --
_tDefeating WEP
_g173 --
_t802.11 Authentication Types
_g184 --
_tShared Key Authentication
_g184 --
_tOpen Authentication
_g184 --
_t802.1X Authentication
_g185 --
_tAdvanced Attacks Against WEP
_g185 --
_tRC4 Encryption Primer
_g185 --
_tRogue APs
_g188 --
_tHow Windows Looks for Preferred Networks
_g189 --
_tOther KARMA Improvements
_g190 --
_tAttacking the Availability of Wireless Networks
_g194 --
_tRTS/CTS Attacks
_g195 --
_tMiscellaneous Wireless Attacks
_g198 --
_g7
_tAttacking WPA-protected 802.11 Networks
_g203 --
_tBreaking WPA/802.11i
_g204 --
_tWPA/802.11i Background
_g204 --
_tAttacking WPA/802.11i Enterprise Authentication
_g212 --
_tEAP-TLS
_g213 --
_tLEAP
_g214 --
_tTunneling EAP Techniques (PEAP/ EAP-TTLS)
_g216 --
_g8
_t802.11 Defense
_g225 --
_tDirect 802.11 Defenses
_g226 --
_tWEP
_g227 --
_tDeploying WPA/WPA2 Securely
_g229 --
_tAvoiding Layer Two Security Altogether
_g231 --
_tVPN Protocol Overview
_g232 --
_t802.11 Intrusion Detection
_g235 --
_tConfiguring PEAP and FreeRadius
_g236 --
_tCreating the Certificate Authority
_g237 --
_tCreating the RADIUS Server's Certificate
_g238 --
_tConfiguring FreeRADIUS
_g240 --
_tStarting Up the RADIUS Server
_g244 --
_tConfiguring the AP
_g244 --
_tConfiguring Windows XP Clients
_g244 --
_tConfiguring OS X Clients
_g249 --
_tConfiguring Linux for PEAP Authentication
_g250 --
_tCommon RADIUS Configuration Problems
_g251 --
_gPart III
_tHacking Additional Wireless Technologies --
_tCase Study: PriorApproval
_g256 --
_g9
_tHacking Hotspots
_g261 --
_tEnumeration
_g263 --
_tIdentifying Hotspot Clients
_g264 --
_tHacking the Infrastructure
_g267 --
_tClient Attacks
_g274 --
_g10
_tThe Potential Threat of Bluetooth
_g287 --
_tWhat Is Bluetooth?
_g288 --
_tHow Far Does Bluetooth Reach?
_g288 --
_tWhat Sort of Functionality Does Bluetooth Have?
_g289 --
_tProblems with Bluetooth Security
_g289 --
_g11
_tAdvanced Attacks
_g333 --
_tLayer 2 Fragmentation
_g334 --
_tBreaking the Silence
_g336 --
_tLayer 2 and Layer 3 Resolution
_g336 --
_tIP
_g337 --
_tUDP
_g342 --
_tTCP
_g342 --
_tDevice Driver Vulnerabilities
_g353.
650 0 _aWireless communication systems
_xSecurity measures.
650 0 _aWireless LANs
_xSecurity measures.
700 1 _aLiu, Vincent.
856 4 2 _3Contributor biographical information
_uhttp://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-b.html
856 4 2 _3Publisher description
_uhttp://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-d.html
856 4 1 _3Table of contents only
_uhttp://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-t.html
942 _cBOOK
994 _aZ0
_bSUPMU
596 _a1 2
999 _c4856
_d4856