Airscanner Mobile Sniffer Manual de usuario Pagina 9

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 16
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 8
355
Index
shutting down, 167
starting, 161–162
Status frame, 165
StumbVerter and MapPoint with, 167
switches (options), 158
user interface, 163–165
wardriving countermeasures using, 174
Web site, 119
Knoppix
Auditor Security Collection, 236, 274,
297–299
Linux distribution, 55–56
Knoppix For Dummies (Sery), 56
• L •
LANfielder packet analyzer, 120
LANguard Network Security Scanner tool
(GFI), 40, 103, 108–109, 214
LanSpy enumeration tool, 103, 108
laptops. See portables or laptops
Layer 2 Tunneling Protocol (L2TP), 280
LBL’s arpwatch, 129
LEAP (Lightweight Extensible Authentication
Protocol)
cracking tools, 292–293, 340
cracking with anwrap, 293
cracking with asleap, 291–292
cracking with THC-LEAPcracker, 292–293
overview, 286–287
security vulnerabilities, 290–291
legal issues, 316–319
Legion enumeration tool, 108
libpcap freeware, 157
libradiate packet injection tool, 240
Lightweight Extensible Authentication
Protocol. See LEAP
LinkFerret packet analyzer, 120
link-monitoring tools (Linux)
iwconfig, 82–85
iwlist, 82, 86–87
iwpriv, 82, 85
iwspy, 82, 87
other tools, 88–90
Wavemon, 87
Wimon, 88
Wireless Extensions, 81–82
Wmap, 88
Wscan, 88
XNetworkStrength, 88
link-monitoring tools (Windows). See
NetStumbler (Network Stumbler) tool
Linux
application mapping, 105
Auditor Linux, 119
distributions on CD, 55–56
emulating on Windows, 46–55
emulating Windows on, 46
freeware distributions, 332
link-monitoring tools, 82–88
Mac OS and, 47
MAC-address spoofing, 198–199
security resources online, 111
Wireless Extensions, 81, 82
Wireless Tools, 81–87
Long, Johnny (ethical-hacking
webmaster), 72
L2TP (Layer 2 Tunneling Protocol), 280
• M •
^M character at end of text files, 49
MAC Changer software, 199
MAC (media-access control) addresses. See
also MAC-address spoofing
BSSID as, 132
checking for unauthorized users, 90
detecting with Network Scanner, 100
determining ad-hoc device connection to
your system, 191–192
enabling MAC address controls, 198,
204–207
filtering, ease of circumventing, 13
in NetStumbler, 144–145
Organizationally Unique Identifiers
(OUI), 144
overview, 197
searching Wi-Fi databases for, 34
Signal-to-Noise Ratio in NetStumbler,
147–148
SMAC MAC address changer, 90–91
sniffing for security vulnerabilities, 221
social engineering to obtain, 73
of unauthorized systems, 183
vendor IDs online, 198
MAC (message authentication code), 257
Mac OS, emulating Windows on, 47
MAC-address spoofing
editing the Windows Registry, 200–203
enabling MAC address controls and, 198,
204–207
30_597302_bindex.qxd 8/4/05 7:27 PM Page 355
Vista de pagina 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Comentarios a estos manuales

Sin comentarios