• Symbols andNumerics •^M character ending text files, 49802 work group, 9802.11 standardscomplexities of, 14DoS attacks and, 226–227802.11i (WPA2), 1
356Hacking Wireless Networks For Dummies MAC-address spoofing (continued)in Linux, 198–199MAC address vendor IDs online, 198SMAC MAC address changer f
357IndexScripting options, 139–140searching the Internet for your files, 71setting up, 134–141Signal-to-Noise Ratio in, 147–148SSIDs in, 145–146status
358Hacking Wireless Networks For Dummies PEAP (Protected Extensible AuthenticationProtocol), 286penetration testing. See also ethical hacking;vulnerab
359Indexhistory of, 64NetStumbler display of, 230–232Queensland attack, 217, 229by signal generators, 232–233sources of, 63–64, 229–230unintentional,
360Hacking Wireless Networks For Dummies standards for ethical hackingCobit, 27ISO/IEC 17799, 26–27ISSAF, 27–28OCTAVE, 27OSSTMM, 28–30overview, 26SSE-
361IndexLayer 2 Tunneling Protocol (L2TP) for, 280Point-to-Point Tunneling Protocol (PPTP)for, 279–280, 295Secure Shell (SSH2) for, 280sniffing, 102–1
362Hacking Wireless Networks For Dummies Wi-Fi networksadvantages of, 9, 10commonly hacked ports (table), 38, 101–102complexities of, 14–15risks incre
348Hacking Wireless Networks For Dummies Antritsu RF generators, 64anwrap LEAP-cracking tool, 293AP overloadingassociation and authentication attacks,
349IndexCheops-ng network-mapping tool, 36chopchop WEP cracker, 274CiscoACU client, 289Aironet 340 antenna, 94SecureACS, 288Clear Channel Assessment (
350Hacking Wireless Networks For Dummies determining network boundsLinux Wireless Extensions and, 81–82Linux Wireless Tools for, 81–87other link monit
351Indexfor emulating Windows or DOS on Linux, 46overview, 46–47VMware setup, 52–55Web sites, 46, 333enabling MAC address controls, 198encryption. See
352Hacking Wireless Networks For Dummies • G •gathering public information. See footprintingGetif utility, 215, 216GFI LANguard Network Security Scann
353IndexIDS/IPS (intrusion-detection/preventionsystem), 80, 253–254, 336–337IEEE (Institute of Electrical and ElectronicsEngineers) standards. See als
354Hacking Wireless Networks For Dummies Internet resources (continued)network-management programs usingSNMP, 214network-mapping tools, 35–36, 340OCTA
355Indexshutting down, 167starting, 161–162Status frame, 165StumbVerter and MapPoint with, 167switches (options), 158user interface, 163–165wardriving
Commentaires sur ces manuels