
351
Index
for emulating Windows or DOS on Linux, 46
overview, 46–47
VMware setup, 52–55
Web sites, 46, 333
enabling MAC address controls, 198
encryption. See also specific types
attacking WEP, 263–264
countermeasures against attacks (home),
274–277
countermeasures against attacks
(organization), 277–278
cracking WEP keys, 264–274
cryptographic protection lacking with
WEP, 260
802.11 features, 255–257
key size and security, 256
message integrity protection and, 256–257
message privacy protection and, 255–256
not a panacea, 255
using, 257–259
VPN protocols, 279–280
WEP vulnerabilities, 78, 256, 259–261
WPA vulnerabilities, 11, 277
WPA2 vulnerabilities, 11
enumeration
defined, 37
performing, 37–38
of SNMP on APs, 214–216
for Windows systems, 103, 108–109
ERP (effective radiated power), 64
ESS (Extended Service Set) configuration,
179, 180
essid_jack SSID reporting tool, 127, 188
Ethereal sniffer, 113–114, 157, 219
ethical hacking. See also hacking wireless
clients
breaking the law, avoiding, 316–319
certifications, 327
defined, 1, 10
ethical defined, 22
following up, 316, 321–324
getting written permission for, 21–22,
312–313
involving others in, 308
local wireless groups, 329–331
other terms for, 1, 10
over-penetrating live networks, 314
penetration testing versus, 1, 10
planning for, 15–16, 307–308
repeated testing needed for, 11
reporting all findings, 25, 314–316
rules for, 319
standards, 26–30
Ten Commandments, 19–25
tools for, 16–17, 303–305, 313–314
using a methodology, 308–309
using data improperly, 314
vulnerability testing versus, 1, 10
Ettercap tools, 209, 212–213, 295
evil twins, 286
Extended Service Set (ESS) configuration,
179–180
Extensible Authentication Protocol. See EAP
extranet VPNs, 279
• F •
Fake AP software, 176
fake APs (honeypots), 74, 175–176
FATA-jack program, 242, 249
file2air packet injection tool, 240
filters
for MAC addresses, 13
in NetStumbler, 146–147
firmware vulnerabilities, testing, 129
following up
documenting lessons learned, 323
failing, 316
keeping up with security issues, 324
monitoring your airwaves, 324
obtaining sign-off, 322–323
organizing and prioritizing results,
321–322
plugging holes you find, 323
practicing with your tools, 324
preparing a professional report, 322
repeating tests, 323
retesting if needed, 322
footprinting
defined, 32
searching Wi-Fi databases, 34–35
searching with Google, 33–34
40-bit encryption, 256, 258–259
Foundstone
query tool for Google, 34, 72
SiteDigger tool, 72
SuperScan port scanner, 37–38, 100–101
fping network-mapping tool, 36
freeRADIUS server, 289
Funk Software
Odyssey 802.1X client software, 289
Steel Belted RADIUS, 289
30_597302_bindex.qxd 8/4/05 7:27 PM Page 351
Commentaires sur ces manuels