Airscanner Mobile Sniffer Manual de usuario Pagina 4

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 16
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 3
350
Hacking Wireless Networks For Dummies
determining network bounds
Linux Wireless Extensions and, 81–82
Linux Wireless Tools for, 81–87
other link monitors for, 88–90
Wavemon for, 87
Wimon for, 88
Wmap for, 88
Wscan for, 88
XNetworkStrength for, 88
Devine, Christopher (aircrack
programmer), 269
dictionary files and word lists, 339
DiGLE (Delphi Imaging Geographic Lookup
Engine), 151–152
dipole antennae, 93
directional versus omnidirectional antennae,
60–61
disabling
probe responses, 175
SSID broadcasts, 13, 129
disassociation attacks, 242
displaying
statistics from wireless nodes with iwspy, 87
wireless interface details with iwlist,
86–87
documentation. See record keeping
domain name, looking up, 35
DoS (denial-of-service) attacks. See also
specific types
AP overloading, 234–241
attacking back, 254
against client systems, 241–250
containing radio waves and, 251–253
countermeasures, 251–254
dangers of testing for, 227
deauthentication attacks, 242–250
defined, 226
demanding fixes for, 254
difficulty of preventing, 228–229
disassociation attacks, 242
disruption created by, 227
ease of carrying out, 228
802.11 vulnerabilities and, 226–227
establishing baseline usage, 251
IDS/IPS systems and, 253–254
limiting bandwidth and, 253
MITM (man-in-the middle) attacks, 208–211
motivations for, 226
network monitoring systems and, 253
physical insecurities and, 250
power-saving features and, 228
Queensland attack, 217, 229
RF jamming, 63–64, 229–233
scenario demonstrating, 225
types of attacks, 227–228
DOSEMU emulation software, 46
DSL (Damn Small Linux), 56
dsniff tools, 124–125, 209
dstumbler wardriving software, 173
dual-boot workstations, 45–46
Dwepcrack WEP cracker, 274
• E •
EAP (Extensible Authentication Protocol)
components, 284
EAP-FAST, 287
EAP-MD5, 285–286
EAP-TLS, 287
EAP-TTLS, 288
Extended EAP in WPA, 285
LEAP, 286–287
overview, 284–285
PEAP, 286
selecting the right version, 297
ECPA (Electronic Communications Privacy
Act), 318
education about human vulnerabilities, 79–80
effective radiated power (ERP), 64
802 work group, 9
802.11 standards
complexities of, 14
DoS attacks and, 226–227
802.11i (WPA2), 10–11, 275–278
encryption features, 255–257
frame authentication lacking in, 226
implementing 802.1X authentication,
288–290
management-frame attacks exploiting,
209–211
message integrity protection and, 256–257
message privacy protection and, 255–256
network-level attack vulnerabilities, 195–196
origin of name, 9
reference guides, 305
RF jamming and, 229
security vulnerabilities, 10–11
802.1X authentication, 288–290
Electronic Communications Privacy Act
(ECPA), 318
e-mail, social engineering tests using, 73
empirical method, 24
emulation software
Cygwin setup, 47–52
for emulating Linux on Windows, 46–55
for emulating Windows on Mac OS, 47
30_597302_bindex.qxd 8/4/05 7:27 PM Page 350
Vista de pagina 3
1 2 3 4 5 6 7 8 9 ... 15 16

Comentarios a estos manuales

Sin comentarios