Airscanner Mobile Sniffer Manual de usuario Pagina 1

Busca en linea o descarga Manual de usuario para Software Airscanner Mobile Sniffer. Hacking Wireless Networks For Dummies Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 16
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
• Symbols and
Numerics •
^M character ending text files, 49
802 work group, 9
802.11 standards
complexities of, 14
DoS attacks and, 226–227
802.11i (WPA2), 10–11, 275–277, 278
encryption features, 255–257
frame authentication lacking in, 226
management-frame attacks exploiting,
209–211
message integrity protection and, 256–257
message privacy protection and, 255–256
network-level attack vulnerabilities, 195–196
origin of name, 9
reference guides, 305
RF jamming and, 229
security vulnerabilities, 10–11
802.1X authentication, 288–290
40-bit encryption, 256, 258–259
104-bit (128-bit) encryption, 256, 258
10pht’s AntiSniff, 130
• A •
access points. See APs
acronyms, glossary of, 341–346
active traffic injection attacks on WEP,
263–264
ACU client (Cisco), 289
Address Resolution Protocol. See ARP
Advanced Encryption Standard (AES), 278
AEGIS 802.1X client software (Meetinghouse
Data), 289
AEGIS RADIUS server (Meetinghouse
Data), 289
Aerosol wardriving software, 173
AES (Advanced Encryption Standard), 278
aircrack WEP-key cracking tool, 269–273
AirDefense IDS system, 80
AirDefense Mobile program, 219
Aireplay traffic injection tool, 263
AirJack packet injection tool, 240
Airjack suite MITM software, 209
AirMagnet
Laptop Analyzer, 219–220
packet analyzer, 119
wardriving software, 173
Aironet 340 antenna (Cisco), 94
AiroPeek and AiroPeek NX sniffers
deauthentication attack viewed in, 247–248
described, 35, 218
detecting network anomalies with, 130
Expert analysis, 189–190
finding unauthorized equipment with,
188–191
overview, 114–115
Peer Map creation with, 188–189
Security Audit Template.ctf, 189
as wardriving software, 173
Web site, 35
AirScanner Mobile Sniffer freeware, 119
Airscanner wardriving software, 173
AirSnare WIDS program, 296
AirSnarf program, 178
AirSnort WEP-key cracking tool, 267–269
AirTraf sniffer, 114
airwaves. See controlling radio signals;
determining network bounds;
RF jamming
Amap application mapping tool, 103, 105
American Registry for Internet Numbers
(ARIN), 35
Anger PPTP cracker, 295
Anritsu spectrum analyzer, 90
antennae
buying wireless NICs and, 59
cantennae, yagi-style, or wave guide, 60, 62,
92–93
choosing, 304
dipole, 93
directional versus omnidirectional, 60–61
DoS attacks and, 252
further information, 62
omnidirectional, 13, 60–61, 94
parabolic grid, 92
radiation patterns, 91–94
signal strength adjustment, 94–95
Web sites, 335
AntiSniff (10pht), 130
Index
30_597302_bindex.qxd 8/4/05 7:27 PM Page 347
COPYRIGHTED MATERIAL
Vista de pagina 0
1 2 3 4 5 6 ... 15 16

Indice de contenidos

Pagina 1 - COPYRIGHTED MATERIAL

• Symbols andNumerics •^M character ending text files, 49802 work group, 9802.11 standardscomplexities of, 14DoS attacks and, 226–227802.11i (WPA2), 1

Pagina 2

356Hacking Wireless Networks For Dummies MAC-address spoofing (continued)in Linux, 198–199MAC address vendor IDs online, 198SMAC MAC address changer f

Pagina 3

357IndexScripting options, 139–140searching the Internet for your files, 71setting up, 134–141Signal-to-Noise Ratio in, 147–148SSIDs in, 145–146status

Pagina 4

358Hacking Wireless Networks For Dummies PEAP (Protected Extensible AuthenticationProtocol), 286penetration testing. See also ethical hacking;vulnerab

Pagina 5

359Indexhistory of, 64NetStumbler display of, 230–232Queensland attack, 217, 229by signal generators, 232–233sources of, 63–64, 229–230unintentional,

Pagina 6

360Hacking Wireless Networks For Dummies standards for ethical hackingCobit, 27ISO/IEC 17799, 26–27ISSAF, 27–28OCTAVE, 27OSSTMM, 28–30overview, 26SSE-

Pagina 7

361IndexLayer 2 Tunneling Protocol (L2TP) for, 280Point-to-Point Tunneling Protocol (PPTP)for, 279–280, 295Secure Shell (SSH2) for, 280sniffing, 102–1

Pagina 8

362Hacking Wireless Networks For Dummies Wi-Fi networksadvantages of, 9, 10commonly hacked ports (table), 38, 101–102complexities of, 14–15risks incre

Pagina 9

348Hacking Wireless Networks For Dummies Antritsu RF generators, 64anwrap LEAP-cracking tool, 293AP overloadingassociation and authentication attacks,

Pagina 10 - (continued)

349IndexCheops-ng network-mapping tool, 36chopchop WEP cracker, 274CiscoACU client, 289Aironet 340 antenna, 94SecureACS, 288Clear Channel Assessment (

Pagina 11

350Hacking Wireless Networks For Dummies determining network boundsLinux Wireless Extensions and, 81–82Linux Wireless Tools for, 81–87other link monit

Pagina 12

351Indexfor emulating Windows or DOS on Linux, 46overview, 46–47VMware setup, 52–55Web sites, 46, 333enabling MAC address controls, 198encryption. See

Pagina 13

352Hacking Wireless Networks For Dummies • G •gathering public information. See footprintingGetif utility, 215, 216GFI LANguard Network Security Scann

Pagina 14

353IndexIDS/IPS (intrusion-detection/preventionsystem), 80, 253–254, 336–337IEEE (Institute of Electrical and ElectronicsEngineers) standards. See als

Pagina 15

354Hacking Wireless Networks For Dummies Internet resources (continued)network-management programs usingSNMP, 214network-mapping tools, 35–36, 340OCTA

Pagina 16

355Indexshutting down, 167starting, 161–162Status frame, 165StumbVerter and MapPoint with, 167switches (options), 158user interface, 163–165wardriving

Comentarios a estos manuales

Sin comentarios