WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] - نسخه متنی

Andrew A. Vladimirov

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











6 Wireless penetration testing procedure


Maximum network discovery and fingerprinting distance with:

Built-in client card antenna

___

12 dBi omnidirectional

___

15 dBi Yagi

___

19 dBi directional

___

ESSID security

default

company name

closed

address

other relevant information

______________________________

Bypassing closed ESSID

closed ESSID value

______________________________

Bypassing MAC filtering

success with MAC

______________________________

Cracking WEP keys

key 1

______________________________

key 2

______________________________

key 3

______________________________

key 4

______________________________

cracking time

___

cracking tool

___

WEP cracking acceleration

time saved

___

traffic injection tool

___

type of traffic injected

___

Brute-forcing 802.1x access

password guessed

______________________________

Other 802.1x attacks

Comments

______________________________

Wireless man-in-the-middle attacks

Tool _________________

layer 1 attack (comments)

______________________________

layer 2 attack (comments)

______________________________

DoS attack resilience / detection (comments)

deauthentication flood

______________________________

deassociation flood

______________________________

malformed frames flood

______________________________

excessive beacon flood

______________________________

authentication flood

______________________________

probe requests flood

______________________________

Other attacks

______________________________

Wireless traffic interception / analysis

packets per minute

___

plaintext and plaintext authentication protocols detected

POP3

Telnet

SMTP

FTP

IMAP

HTTP

NNTP

Instant messengers

IRC

SQL

PAP

LDAP

Other

______________________________

passwords/user credentials collected

username/password

______________________________

username/password

______________________________

username/password

______________________________

username/password

______________________________

weak encryption/vulnerable protocols detected

LM/ NTLMv1

SSHv1

Other

______________________________

passwords cracked

username/password

______________________________

username/password

______________________________

username/password

______________________________

username/password

______________________________

UNIX remote services

___

type

___

SMB shares on WLAN

______________________________

NFS shares detected

______________________________

DHCP traffic detected

______________________________

HSRP/VRRP traffic detected

______________________________

HSRP password

______________________________

VRRP authentication

______________________________

VRRP password

______________________________

CDP traffic detected

______________________________

CDP data gathered

______________________________

ICMP type 9/10 implementation

RIPv1 running

Unauthenticated routing protocols over wireless network

RIPv2

OSPF

IGRP

EIGRP

IS-IS

IPX RIP

NLSP

Other ________________

Unauthenticated NTP traffic

SNMP traffic

SNMP communities found

___

SNMP version

___

NetBIOS over IPX traffic

AppleTalk traffic

DecNet traffic

Banyan Vines traffic

SNA traffic

Other ________________

Remote administration traffic

VNC

PCAnywhere

Webmin

Other ________________

Remote X Server cookies

Syslog traffic

over UDP

over TCP

Passive OS fingerprinting

_________________________________

Gateway discovery (IP)

_________________________________

IDS host discovery

_________________________________

ARP spoofing man-in-the-middle attack

_________________________________

Switch CAM table flooding

_________________________________

Route injection attacks

_________________________________

ICMP route redirection

_________________________________

DNS cache poisoning

_________________________________

DHCP DoS attacks

_________________________________

Tunneling protocols attack

_________________________________

VPN enumeration

_________________________________

VPN-related attacks

_________________________________

Active OS fingerprinting

_________________________________

Discovered backdoors / backchannel traffic

_________________________________

Banner grabbing and host penetrationpenetrated hosts ()

IP/hostname:vulnerability

_________________________________

IP/hostname:vulnerability

_________________________________

IP/hostname:vulnerability

_________________________________

Network / host DoS resilience testing

attack/host/result

_________________________________

attack/host/result

_________________________________

attack/host/result

_________________________________

Egress filtering firewall testing from the wireless site

_________________________________

Physical security issues discovered

_________________________________

Social engineering attacks

_________________________________


/ 174