
352
Hacking Wireless Networks For Dummies
• G •
gathering public information. See footprinting
Getif utility, 215, 216
GFI LANguard Network Security Scanner tool,
40, 103, 108–109, 214
Global Gadget signal generator, 232
global positioning system. See GPS
glossary of acronyms, 341–346
GNU/Debian Linux CD distribution, 56
goal setting, 20–21, 24
Google
as essential hacking tool, 305
footprinting using, 33–34
Foundstone query tool for, 34, 72
further information for ethical hacking
with, 72
passive tests for social engineering, 71–72
security issue information from, 41
GPS (global positioning system)
Kismet GPSD installation and options,
159–160
NetStumbler options, 138–139
overview, 62–63
receiver, 304
GpsDrive GPS mapping software, 157
Gulpit sniffer, 117–119
gWireless wardriving software, 173
• H •
hackers (unethical), 12–14
Hacking For Dummies (Beaver)
downloading passwords chapter, 78, 107
Ethical Hacking Commandments in, 19
ethical hacking methodology in, 56
information-security assessment in, 33
for insight into hackers, 14
as inspiration for this book, 2
operating system security information
in, 111
hacking wireless clients
application mapping (Linux), 105
for common application weaknesses,
104–105
countermeasures, 111–112
discovering WEP keys, 109–110
information available from clients, 98
looking for general vulnerabilities, 103–109
overview, 97–98
port scanning, 99–102
security dangers of clients, 98–99
steps for, 99
tools for, 100, 102–103
VPNMonitor for, 102–103
for Windows null sessions, 106–109
Hacking Wireless Networks For Dummies
(Beaver and Davis)
assumptions about the reader, 3
icons in margins, 5
organization, 3–5
overview, 1–2
using, 2–3, 6
hardware. See also unauthorized equipment;
specific kinds
antennae, 13, 59–62, 91–95, 252, 304, 335
attenuators, 94
GPS, 62–64, 138–139, 159–160, 304
PDAs, 44
portables or laptops, 44–45, 75–76, 155–156,
178, 303
signal generators, 232–233
transceivers (wireless NICs), 57–59,
109–110, 199–200, 304, 309–312
harm, doing no, 23–24
Hermes chipset, 57–58
Hewlett-Packard PDAs, 44
Honeyd-WIN32 honeypot software, 176
honeypots (fake APs), 74, 175–176
HP RF generators, 64
human vulnerabilities. See also specific kinds
candy security and, 68
countermeasures for, 78–80
dangers of ignoring, 68
default settings, 76–77
ground-level security and, 69, 80
overlooking, mindset and, 69–70
overview, 67–68
security versus convenience and
usability, 69
social engineering, 17, 67, 70–74
training and education for preventing, 79–80
unauthorized equipment, 69, 74–76
weak passwords, 77–78
wireless security policy and, 78–79
• I •
IAS (Internet Authentication Service) of
Microsoft, 288
IBSS (Independent Basic Service Set)
configuration, 180–181
icons in margins of this book, 5
ICV (integrity check value), 257
30_597302_bindex.qxd 8/4/05 7:27 PM Page 352
Comentarios a estos manuales