WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] - نسخه متنی

Andrew A. Vladimirov

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











5 Network problems / anomalies detected


connection loss

excessive collisions

common RF issues

near/far problem

hidden node

interference

interference type

narrowband

wideband

channel overlapping

interference source

______________________________

abnormal frames

______________________________

excessive number of management / control frames

excessive frame type

___

excessive frame structure

___

rogue APs

AP1______________________

AP3_______________________

AP2______________________

rogue APs MACs

AP1______________________

AP3_______________________

AP2______________________

rogue APs IPs

AP1______________________

AP3_______________________

AP2______________________

rogue APs channels

AP1______________________

AP3_______________________

AP2______________________

rogue APs ESSIDs

AP1______________________

AP3_______________________

AP2______________________

rogue APs location

AP1______________________

AP3_______________________

AP2______________________

rogue AP signal strength

AP1______________________

AP3_______________________

AP2______________________

rogue APs use WEP

AP1______________________

AP3_______________________

AP2______________________

rogue APs WEP keys

AP1______________________

AP3_______________________

AP2______________________

rogue APs origin

intentional

unknown

unintentional

rogue access points have associated hosts

hosts associated (IP/MAC)

_____________________________________

_____________________________________

_____________________________________

other rogue wireless hosts detected

number of hosts

___

MAC1

_________________

IP1

__________________

MAC2

_________________

IP2

__________________

MAC3

_________________

IP3

__________________

physically discovered rogue wireless devices

PCMCIA client card

USB wireless client

CF client card

other

______________________________

Known signatures of wireless attack tools (version)

Netstumbler

___

Dstumbler

___

Windows XP scan

___

Wellenreiter

___

Airjack

___

Fata_jack

___

FakeAP

___

Other

___

Man-in-the-middle attacks signs (Double MAC / IP addresses)

MiM1

_______________________

MiM2

_______________________

MiM3

_______________________

MiM4

_______________________

Out of sequence frames present (amount/time)

_____/_____

Excessive deassociate frames

deauthenticate frames

time

___

amount

___

channel

___

Exsessive RF noise

strength

___

channel

___

Rogue DHCP servers present

IP

___________________

MAC ____________________

Atypical route advertisement (type/comments)

Type ____________________

Comments _______________

Type __________________

Comments _______________

Wireless DoS attack signs

Management/control frames flood

frame types _______________

origin MAC ________________

frame types _______________

origin MAC ________________

frame types _______________

origin MAC ________________

Out-of-sequence frames

origin MAC __________________________

Excessive RF noise

channel

___

jamming device discovered

___

strength

___

comments ____________________________________

High-layer DoS attack __________________________________

Comments ____________________________________________

High-layer DoS attack __________________________________

Comments ____________________________________________

Attacks against the access point detected _______________________________________

Comments ____________________________________________

brute-forcing attacks

via SNMP

___

via SSH

___

via telnet

___

via other means

___

via Web interface

___

Attacks against wireless hosts detected

Comments ____________________________________________

Attacks directed at the wired hosts from the WLAN _____________________________

Comments ____________________________________________

Attacks directed at the hosts on the Internet

Comments ____________________________________________

Attempts to send SPAM

Comments ____________________________________________


/ 174