
358
Hacking Wireless Networks For Dummies
PEAP (Protected Extensible Authentication
Protocol), 286
penetration testing. See also ethical hacking;
vulnerability assessment or testing
defined, 20
dsniff tools for, 124–125
ethical hacking versus, 1, 10
performing, 41–42
Pepper, Hugh (cantennae vendor), 60
permission for ethical hacking, written,
21–22, 312–313
personal digital assistants (PDAs), 44–45
physical security. See also human
vulnerabilities
countermeasures, 90–95
DoS attacks and, 250
ping sweep, 36, 100, 126. See also port
scanning
planning for ethical hacking
goal setting, 20–21
importance of, 307–308
overview, 15–16, 21
Plex86 emulation software, 46
Pocket Warrior wardriving software, 174
pocketWinc wardriving software, 174
Point-to-Point Tunneling Protocol (PPTP) of
Microsoft, 279–280, 295
pong vulnerability-assessment tool, 129
port scanning
commonly hacked ports (table), 38, 101–102
enumeration using, 37–38
information discovered by, 99–100
ping sweep for, 100
tools for, 100, 305
port stealing, 209
portables or laptops
advantages for ethical hacking, 44–45
choosing, 303
components for, 45
PDAs versus, 44–45
portability of, 155–156
testing for unauthorized equipment using,
75–76
unauthorized clients, 178
ports commonly hacked, 38, 101–102. See
also port scanning
power signal generators (PSGs), 64
power-saving features, DoS attacks and, 228
PPTP (Point-to-Point Tunneling Protocol) of
Microsoft, 279–280, 295
Prism Test Utility, 217
Prism2 chipset, 57–58, 217
privacy of messages, 23, 255–256
probe responses, disabling, 175
Protected Extensible Authentication Protocol
(PEAP), 286
protocol analyzers. See sniffers (network
analyzers)
protocols. See also specific protocols
sniffing for security vulnerabilities, 220
unauthorized systems and, 183
for VPNs, 279–280
PSGs (power signal generators), 64
public information, gathering. See
footprinting
• Q •
QualysGuard network-mapping tool
automatic vulnerability assessment with, 40
described, 103
finding client vulnerabilities with, 104–105
network mapping with, 36
SNMP vulnerabilities found by, 214–215
Queensland attack, 217, 229
• R •
radiation patterns of antennae, 91–94
radio signals. See controlling radio signals;
determining network bounds; RF
jamming
RADIUS servers, 288–289
RC4 algorithm (WEP), 258, 260–261, 283–284
record keeping
documenting lessons learned, 323
logging what you do, 32
overview, 22–23
reporting all findings, 25, 314–316
Registry (Windows), editing for MAC-address
spoofing, 200–203
Remember icon, 5
remote access VPNs, 279
repeating tests, 11, 24, 323
reporting all findings, 25, 314–316. See also
following up
resources. See Internet resources
RF generators, 64
RF jamming
common signal interrupters, 230
dangers of, 230
devices for, 64
802.11 standards and, 229
30_597302_bindex.qxd 8/4/05 7:27 PM Page 358
Comentarios a estos manuales