Airscanner Mobile Sniffer Manuel d'utilisateur Page 1

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel Airscanner Mobile Sniffer. Hacking Wireless Networks For Dummies Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 16
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
• Symbols and
Numerics •
^M character ending text files, 49
802 work group, 9
802.11 standards
complexities of, 14
DoS attacks and, 226–227
802.11i (WPA2), 10–11, 275–277, 278
encryption features, 255–257
frame authentication lacking in, 226
management-frame attacks exploiting,
209–211
message integrity protection and, 256–257
message privacy protection and, 255–256
network-level attack vulnerabilities, 195–196
origin of name, 9
reference guides, 305
RF jamming and, 229
security vulnerabilities, 10–11
802.1X authentication, 288–290
40-bit encryption, 256, 258–259
104-bit (128-bit) encryption, 256, 258
10pht’s AntiSniff, 130
• A •
access points. See APs
acronyms, glossary of, 341–346
active traffic injection attacks on WEP,
263–264
ACU client (Cisco), 289
Address Resolution Protocol. See ARP
Advanced Encryption Standard (AES), 278
AEGIS 802.1X client software (Meetinghouse
Data), 289
AEGIS RADIUS server (Meetinghouse
Data), 289
Aerosol wardriving software, 173
AES (Advanced Encryption Standard), 278
aircrack WEP-key cracking tool, 269–273
AirDefense IDS system, 80
AirDefense Mobile program, 219
Aireplay traffic injection tool, 263
AirJack packet injection tool, 240
Airjack suite MITM software, 209
AirMagnet
Laptop Analyzer, 219–220
packet analyzer, 119
wardriving software, 173
Aironet 340 antenna (Cisco), 94
AiroPeek and AiroPeek NX sniffers
deauthentication attack viewed in, 247–248
described, 35, 218
detecting network anomalies with, 130
Expert analysis, 189–190
finding unauthorized equipment with,
188–191
overview, 114–115
Peer Map creation with, 188–189
Security Audit Template.ctf, 189
as wardriving software, 173
Web site, 35
AirScanner Mobile Sniffer freeware, 119
Airscanner wardriving software, 173
AirSnare WIDS program, 296
AirSnarf program, 178
AirSnort WEP-key cracking tool, 267–269
AirTraf sniffer, 114
airwaves. See controlling radio signals;
determining network bounds;
RF jamming
Amap application mapping tool, 103, 105
American Registry for Internet Numbers
(ARIN), 35
Anger PPTP cracker, 295
Anritsu spectrum analyzer, 90
antennae
buying wireless NICs and, 59
cantennae, yagi-style, or wave guide, 60, 62,
92–93
choosing, 304
dipole, 93
directional versus omnidirectional, 60–61
DoS attacks and, 252
further information, 62
omnidirectional, 13, 60–61, 94
parabolic grid, 92
radiation patterns, 91–94
signal strength adjustment, 94–95
Web sites, 335
AntiSniff (10pht), 130
Index
30_597302_bindex.qxd 8/4/05 7:27 PM Page 347
COPYRIGHTED MATERIAL
Vue de la page 0
1 2 3 4 5 6 ... 15 16

Résumé du contenu

Page 1 - COPYRIGHTED MATERIAL

• Symbols andNumerics •^M character ending text files, 49802 work group, 9802.11 standardscomplexities of, 14DoS attacks and, 226–227802.11i (WPA2), 1

Page 2

356Hacking Wireless Networks For Dummies MAC-address spoofing (continued)in Linux, 198–199MAC address vendor IDs online, 198SMAC MAC address changer f

Page 3

357IndexScripting options, 139–140searching the Internet for your files, 71setting up, 134–141Signal-to-Noise Ratio in, 147–148SSIDs in, 145–146status

Page 4

358Hacking Wireless Networks For Dummies PEAP (Protected Extensible AuthenticationProtocol), 286penetration testing. See also ethical hacking;vulnerab

Page 5

359Indexhistory of, 64NetStumbler display of, 230–232Queensland attack, 217, 229by signal generators, 232–233sources of, 63–64, 229–230unintentional,

Page 6

360Hacking Wireless Networks For Dummies standards for ethical hackingCobit, 27ISO/IEC 17799, 26–27ISSAF, 27–28OCTAVE, 27OSSTMM, 28–30overview, 26SSE-

Page 7

361IndexLayer 2 Tunneling Protocol (L2TP) for, 280Point-to-Point Tunneling Protocol (PPTP)for, 279–280, 295Secure Shell (SSH2) for, 280sniffing, 102–1

Page 8

362Hacking Wireless Networks For Dummies Wi-Fi networksadvantages of, 9, 10commonly hacked ports (table), 38, 101–102complexities of, 14–15risks incre

Page 9

348Hacking Wireless Networks For Dummies Antritsu RF generators, 64anwrap LEAP-cracking tool, 293AP overloadingassociation and authentication attacks,

Page 10 - (continued)

349IndexCheops-ng network-mapping tool, 36chopchop WEP cracker, 274CiscoACU client, 289Aironet 340 antenna, 94SecureACS, 288Clear Channel Assessment (

Page 11

350Hacking Wireless Networks For Dummies determining network boundsLinux Wireless Extensions and, 81–82Linux Wireless Tools for, 81–87other link monit

Page 12

351Indexfor emulating Windows or DOS on Linux, 46overview, 46–47VMware setup, 52–55Web sites, 46, 333enabling MAC address controls, 198encryption. See

Page 13

352Hacking Wireless Networks For Dummies • G •gathering public information. See footprintingGetif utility, 215, 216GFI LANguard Network Security Scann

Page 14

353IndexIDS/IPS (intrusion-detection/preventionsystem), 80, 253–254, 336–337IEEE (Institute of Electrical and ElectronicsEngineers) standards. See als

Page 15

354Hacking Wireless Networks For Dummies Internet resources (continued)network-management programs usingSNMP, 214network-mapping tools, 35–36, 340OCTA

Page 16

355Indexshutting down, 167starting, 161–162Status frame, 165StumbVerter and MapPoint with, 167switches (options), 158user interface, 163–165wardriving

Commentaires sur ces manuels

Pas de commentaire