WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] - نسخه متنی

Andrew A. Vladimirov

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید













Table of Contents

Index

Wi-Foo

By
Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky

Publisher: Addison Wesley

Pub Date: June 28, 2004

ISBN: 0-321-20217-1

Pages: 592



Copyright

Acknowledgments

About the Authors

Introduction


Why Does Wi-Foo Exist and for Whom Did We Write It?


What About the Funky Name?


How This Book Is Organized


Chapter 1.
Real World Wireless Security


Why Do We Concentrate on 802.11 Security?


Getting a Grip on Reality: Wide Open 802.11 Networks Around Us


The Future of 802.11 Security: Is It as Bright as It Seems?


Summary


Chapter 2.
Under Siege


Why Are "They" After Your Wireless Network?


Wireless Crackers: Who Are They?


Corporations, Small Companies, and Home Users: Targets Acquired


Target Yourself: Penetration Testing as Your First Line of Defense


Summary


Chapter 3.
Putting the Gear Together: 802.11 Hardware


PDAs Versus Laptops


PCMCIA and CF Wireless Cards


Antennas


RF Amplifiers


RF Cables and Connectors


Summary


Chapter 4.
Making the Engine Run: 802.11 Drivers and Utilities


Operating System, Open Source, and Closed Source


The Engine: Chipsets, Drivers, and Commands


Getting Used to Efficient Wireless Interface Configuration


Summary


Chapter 5.
Learning to WarDrive: Network Mapping and Site Surveying


Active Scanning in Wireless Network Discovery


Monitor Mode Network Discovery and Traffic Analysis Tools


Tools That Use the iwlist scan Command


RF Signal Strength Monitoring Tools


Summary


Chapter 6.
Assembling the Arsenal: Tools of the Trade


Encryption Cracking Tools


Wireless Frame-Generating Tools


Wireless Encrypted Traffic Injection Tools: Wepwedgie


Access Point Management Utilities


Summary


Chapter 7.
Planning the Attack


The "Rig"


Network Footprinting


Site Survey Considerations and Planning


Proper Attack Timing and Battery Power Preservation


Stealth Issues in Wireless Penetration Testing


An Attack Sequence Walk-Through


Summary


Chapter 8.
Breaking Through


The Easiest Way to Get in


A Short Fence to Climb: Bypassing Closed ESSIDs, MAC, and Protocols Filtering


Picking a Trivial Lock: Various Means of Cracking WEP


Picking the Trivial Lock in a Less Trivial Way: Injecting Traffic to Accelerate WEP Cracking


Field Observations in WEP Cracking


Cracking TKIP: The New Menace


The Frame of Deception: Wireless Man-in-the-Middle Attacks and Rogue Access Points Deployment


Breaking the Secure Safe


The Last Resort: Wireless DoS Attacks


Summary


Chapter 9.
Looting and Pillaging: The Enemy Inside


Step 1: Analyze the Network Traffic


Step 2: Associate to WLAN and Detect Sniffers


Step 3: Identify the Hosts Present and Perform Passive Operating System Fingerprinting


Step 4: Scan and Exploit Vulnerable Hosts on WLAN


Step 5: Take the Attack to the Wired Side


Step 6: Check Wireless-to-Wired Gateway Egress Filtering Rules


Summary


Chapter 10.
Building the Citadel: An Introduction to Wireless LAN Defense


Wireless Security Policy: The Cornerstone


Layer 1 Wireless Security Basics


The Usefulness of WEP, Closed ESSIDs, MAC Filtering, and SSH Port Forwarding


Secure Wireless Network Positioning and VLANs


Deploying a Linux-Based, Custom-Built Hardened Wireless Gateway


Proprietary Improvements to WEP and WEP Usage


802.11i Wireless Security Standard and WPA: The New Hope


Summary


Chapter 11.
Introduction to Applied Cryptography: Symmetric Ciphers


Introduction to Applied Cryptography and Steganography


Modern-Day Cipher Structure and Operation Modes


Bit by Bit: Streaming Ciphers and Wireless Security


The Quest for AES


Between DES and AES: Common Ciphers of the Transition Period


Selecting a Symmetric Cipher for Your Networking or Programming Needs


Summary


Chapter 12.
Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms


Cryptographic Hash Functions


Dissecting an Example Standard One-Way Hash Function


Hash Functions, Their Performance, and HMACs


Asymmetric Cryptography: A Different Animal


Summary


Chapter 13.
The Fortress Gates: User Authentication in Wireless Security


RADIUS


Installation of FreeRADIUS


User Accounting


RADIUS Vulnerabilities


RADIUS-Related Tools


802.1x: The Gates to Your Wireless Fortress


LDAP


NoCat: An Alternative Method of Wireless User Authentication


Summary


Chapter 14.
Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs


Why You Might Want to Deploy a VPN


VPN Topologies Review: The Wireless Perspective


Common VPN and Tunneling Protocols


Alternative VPN Implementations


The Main Player in the Field: IPSec Protocols, Operations, and Modes Overview


Deploying Affordable IPSec VPNs with FreeS/WAN


Summary


Chapter 15.
Counterintelligence: Wireless IDS Systems


Categorizing Suspicious Events on WLANs


Examples and Analysis of Common Wireless Attack Signatures


Radars Up! Deploying a Wireless IDS Solution for Your WLAN


Summary


Afterword


Appendix A.
DecibelWatts Conversion Table


Appendix B.
802.11 Wireless Equipment


Appendix C.
Antenna Irradiation Patterns


Omni-Directionals:


Semi-Directionals:


Highly-directionals


Appendix D.
Wireless Utilities Manpages



Section 1.
Iwconfig



Section 2.
Iwpriv



Section 3.
Iwlist



Section 4.
Wicontrol



Section 5.
Ancontrol


Appendix E.
Signal Loss for Obstacle Types


Appendix F.
Warchalking Signs


Original Signs


Proposed New Signs


Appendix G.
Wireless Penetration Testing Template


Arhont Ltd Wireless Network Security and Stability Audit Checklist Template



Section 1.
Reasons for an audit



Section 2.
Preliminary investigations



Section 3.
Wireless site survey



Section 4.
Network security features present



Section 5.
Network problems / anomalies detected



Section 6.
Wireless penetration testing procedure



Section 7.
Final recommendations


Appendix H.
Default SSIDs for Several Common 802.11 Products


Glossary

Index


/ 174