000 | 05951cam a2200361 a 4500 | ||
---|---|---|---|
001 | u8308 | ||
003 | SA-PMU | ||
005 | 20210418123828.0 | ||
008 | 070827s2007 nyua 001 0 eng | ||
010 | _a 2007035664 | ||
040 |
_aDLC _beng _cDLC _dYDX _dDPE _dXVF _dBAKER _dIXA _dQBX _dUKM _dOMP _dYDXCP _dBTCTA _dUUS _dMVCLD _dHEBIS _dHDC _dOCLCF _dOCLCO |
||
020 | _a9780072262582 (pbk.) | ||
020 | _a0072262583 (pbk.) | ||
035 |
_a(OCoLC)123415793 _z(OCoLC)76935566 |
||
050 | 0 | 0 |
_aTK5103.2 _b.C23 2007 |
082 | 0 | 0 |
_a621.382 _222 |
100 | 1 | _aCache, Johnny. | |
245 | 1 | 0 |
_aHacking exposed wireless : _bwireless security secrets & solutions / _cJohnny Cache, Vincent Liu. |
260 |
_aNew York, NY : _bMcGraw-Hill, _cc2007. |
||
300 |
_axxv, 387 p. : _bill. ; _c24 cm. |
||
500 | _aIncludes index. | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | 0 |
_tCase Study: BuzzCorp _g2 -- _tWireless Setup _g2 -- _tWireless Risks and Security Controls _g2 -- _g1 _tWireless Security Overview _g3 -- _tUse and Spread of Wireless Technologies _g4 -- _tA Brief History of Wireless Technologies _g5 -- _tBasics of Wireless Technologies _g5 -- _tWhat Is Wireless? _g5 -- _tStandardization and Regulation _g6 -- _tFurther Coverage _g7 -- _tThe Risks of Wireless Technologies _g7 -- _tAdvances in Wireless Security _g10 -- _g2 _tRadio Frequency _g13 -- _tRF Terminology _g14 -- _tCommunications Systems _g14 -- _tRadio Frequency Signals _g17 -- _tElectromagnetic Waves _g19 -- _tUnits of Measure _g20 -- _tModulation _g24 -- _tSpread Spectrum and Multiplexing _g31 -- _tRF Hardware _g35 -- _tAntennas _g36 -- _tAmplifiers _g41 -- _tGovernment Regulations _g43 -- _tWireless Standards _g44 -- _tWireless LAN (802.11 a/b/g/n) _g45 -- _gPart II _tHacking 802.11 Wireless Technology -- _tCase Study: Riding the Insecure Airwaves _g52 -- _t802.11 History _g54 -- _tWi-Fi vs. 802.11 _g55 -- _t802.11 in a Nutshell _g55 -- _tThe 802.11 MAC _g55 -- _tFeatures of the 802.11 MAC _g56 -- _t802.11 Packet Types _g61 -- _tControl Packets _g61 -- _tManagement Packets _g62 -- _tData Packets _g63 -- _tAddressing in 802.11 Packets _g63 -- _tInteresting Fields Across Packets _g64 -- _tFinding and Connecting to Wireless Networks _g66 -- _tLocating Wireless Networks _g66 -- _tConnecting to a Wireless Network _g67 -- _tWPA/802.11i Background _g68 -- _t802.11i Groundwork _g69 -- _tExtensible Authentication Protocol (EAP) _g70 -- _t802.1X: Bringing EAP to the LAN _g76 -- _t802.11i: Putting It All Together _g78 -- _tAuthentication Using 802.11i _g78 -- _tConfidentiality in 802.11i _g84 -- _tIntegrity in 802.11i _g87 -- _tReplay Protection in 802.11i _g88 -- _g4 _t802.11 Discovery _g91 -- _tDiscovery Basics _g92 -- _tHardware and Drivers _g98 -- _tChipsets _g101 -- _tCards _g104 -- _tDrivers _g106 -- _tAntennas _g117 -- _tGPS _g120 -- _g5 _tScanning and Enumerating 802.11 Networks _g125 -- _tChoosing an Operating System _g126 -- _tWindows _g126 -- _tLinux _g126 -- _tOS X _g127 -- _tWindows Discovery Tools _g127 -- _tNetStumbler _g127 -- _tAiroPeek _g140 -- _tLinux Discovery Tools _g146 -- _tKismet _g147 -- _tWellenreiter _g153 -- _tOS X Discovery Tools _g154 -- _tKismac _g154 -- _tMacStumbler _g159 -- _tiStumbler _g160 -- _tKismet on OS X _g161 -- _tOnline Mapping Services (wigle, .kismac, Google Earth) _g161 -- _tNetwork Identifiers _g162 -- _tUNIX Sniffers _g163 -- _tDisplaying a Saved pcap File _g164 -- _tCapturing Packets in Real-Time _g164 -- _tWireshark Colors _g165 -- _g6 _tAttacking 802.11 Networks _g167 -- _tBasic Types of Attacks _g168 -- _tSecurity Through Obscurity _g168 -- _tDefeating WEP _g173 -- _t802.11 Authentication Types _g184 -- _tShared Key Authentication _g184 -- _tOpen Authentication _g184 -- _t802.1X Authentication _g185 -- _tAdvanced Attacks Against WEP _g185 -- _tRC4 Encryption Primer _g185 -- _tRogue APs _g188 -- _tHow Windows Looks for Preferred Networks _g189 -- _tOther KARMA Improvements _g190 -- _tAttacking the Availability of Wireless Networks _g194 -- _tRTS/CTS Attacks _g195 -- _tMiscellaneous Wireless Attacks _g198 -- _g7 _tAttacking WPA-protected 802.11 Networks _g203 -- _tBreaking WPA/802.11i _g204 -- _tWPA/802.11i Background _g204 -- _tAttacking WPA/802.11i Enterprise Authentication _g212 -- _tEAP-TLS _g213 -- _tLEAP _g214 -- _tTunneling EAP Techniques (PEAP/ EAP-TTLS) _g216 -- _g8 _t802.11 Defense _g225 -- _tDirect 802.11 Defenses _g226 -- _tWEP _g227 -- _tDeploying WPA/WPA2 Securely _g229 -- _tAvoiding Layer Two Security Altogether _g231 -- _tVPN Protocol Overview _g232 -- _t802.11 Intrusion Detection _g235 -- _tConfiguring PEAP and FreeRadius _g236 -- _tCreating the Certificate Authority _g237 -- _tCreating the RADIUS Server's Certificate _g238 -- _tConfiguring FreeRADIUS _g240 -- _tStarting Up the RADIUS Server _g244 -- _tConfiguring the AP _g244 -- _tConfiguring Windows XP Clients _g244 -- _tConfiguring OS X Clients _g249 -- _tConfiguring Linux for PEAP Authentication _g250 -- _tCommon RADIUS Configuration Problems _g251 -- _gPart III _tHacking Additional Wireless Technologies -- _tCase Study: PriorApproval _g256 -- _g9 _tHacking Hotspots _g261 -- _tEnumeration _g263 -- _tIdentifying Hotspot Clients _g264 -- _tHacking the Infrastructure _g267 -- _tClient Attacks _g274 -- _g10 _tThe Potential Threat of Bluetooth _g287 -- _tWhat Is Bluetooth? _g288 -- _tHow Far Does Bluetooth Reach? _g288 -- _tWhat Sort of Functionality Does Bluetooth Have? _g289 -- _tProblems with Bluetooth Security _g289 -- _g11 _tAdvanced Attacks _g333 -- _tLayer 2 Fragmentation _g334 -- _tBreaking the Silence _g336 -- _tLayer 2 and Layer 3 Resolution _g336 -- _tIP _g337 -- _tUDP _g342 -- _tTCP _g342 -- _tDevice Driver Vulnerabilities _g353. |
650 | 0 |
_aWireless communication systems _xSecurity measures. |
|
650 | 0 |
_aWireless LANs _xSecurity measures. |
|
700 | 1 | _aLiu, Vincent. | |
856 | 4 | 2 |
_3Contributor biographical information _uhttp://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-b.html |
856 | 4 | 2 |
_3Publisher description _uhttp://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-d.html |
856 | 4 | 1 |
_3Table of contents only _uhttp://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-t.html |
942 | _cBOOK | ||
994 |
_aZ0 _bSUPMU |
||
596 | _a1 2 | ||
999 |
_c4856 _d4856 |