
362
Hacking Wireless Networks For Dummies
Wi-Fi networks
advantages of, 9, 10
commonly hacked ports (table), 38, 101–102
complexities of, 14–15
risks increased by popularity of, 9–10
security policy for, 78–79
smaller network vulnerabilities, 12
standards, 9, 10–11
system configurations, 179–181
types of risks for, 11–12
vulnerabilities for all networks, 12–13
Wi-Fi Protected Access. See WPA standard
WiGLE database, 34
WiLDing (Wireless LAN Discovery). See
wardriving
Wimon connection-monitoring tool, 88
Windows (Microsoft). See also Microsoft
802.1X client software for XP, 289
emulating Linux on, 46–55
emulating on Linux, 46
emulating on Mac OS, 47
finding shares, 107–109
MAC-address spoofing, 199–203
security resources online, 111
testing for null sessions, 106–109
testing for unauthorized equipment using,
75–76
WINE emulation software, 46
Win4Lin emulation software, 46
Wired Equivalent Privacy. See WEP
wireless client software, 184–186
wireless demilitarized zone (WDMZ), 297
Wireless Extensions (Linux), 81–82
wireless intrusion-detection system (WIDS),
253–254, 296
Wireless LAN Discovery (WiLDing). See
wardriving
wireless local-area networks (WLANs).
See Wi-Fi networks
Wireless Networks For Dummies (Davis)
antennae information in, 62
manual assessment information in, 40
NetStumbler filters described in, 146
as reference guide, 305
VPN information in, 280
wireless NIC information in, 57
wireless-network fundamentals in, 15
wireless NICs (transceivers)
buying, 59, 304
determining your chipset, 57–58
external antenna connector, 59
NetStumbler versus Kismet and, 57
resetting network properties for
MAC-address spoofing, 199–200
unbinding when wardriving, 309–312
WEP key vulnerabilities, 109–110
Wireless Security Auditor software, 174
wireless security policy, 78–79
Wireless Tools (Linux)
iwconfig, 82–85
iwlist, 82, 86–87
iwpriv, 82, 85
iwspy, 82, 87
overview, 81–82
WiStumbler wardriving software, 174
Wlandump wardriving software, 174
WLAN-jack, 242, 249
WLANs (wireless local-area networks). See
Wi-Fi networks
Wmap link-monitoring tool, 88
word lists and dictionary files, 339
WPA Cracker tool, 294
WPA (Wi-Fi Protected Access) standard
authentication using, 293–294
cracking tools, 338
Extended EAP authentication, 285
overview, 10
security vulnerabilities, 11, 277
using, 275–277
WPA2 (IEEE 802.11i) standard
authentication using, 294–295
overview, 10, 278
security vulnerabilities, 11
social engineering and, 73
using, 278
WPA versus, 275–277
Wright, Joshua (programmer), 294
Wscan link-monitoring tool, 88
• X •
XMap mapping software (DeLorme), 63
XNetworkStrength tool, 88
• Y •
yagi-style antennae, 60, 62, 92–93
YDI power signal generators, 64
YDI Wireless signal generator, 232
30_597302_bindex.qxd 8/4/05 7:27 PM Page 362
Comentarios a estos manuales