Airscanner Mobile Sniffer Uživatelský manuál Strana 11

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 16
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 10
357
Index
Scripting options, 139–140
searching the Internet for your files, 71
setting up, 134–141
Signal-to-Noise Ratio in, 147–148
SSIDs in, 145–146
status messages, 134–135
StumbVerter and MapPoint with, 149–150
toolbar, 140–141
Web site, 35
network analyzers or monitors. See sniffers
network bounds. See determining network
bounds
network interface cards (NICs). See wireless
NICs (transceivers)
Network Protocol Analyzer (SoftPerfect), 120
Network Scanner (SoftPerfect), 100
network scanners, 340
Network Security For Dummies (Cobb), 40, 111
Network Stumbler. See NetStumbler tool
Network Stumbler Options dialog box,
136–140
network-level attacks
ARP-poisoning attacks, 209, 211–213
Clear Channel Assessment attack, 217
countermeasures, 222–223
dangers of attacks, 196–197
dangers of testing for, 197
802.11 vulnerabilities, 195–196
MAC-address spoofing, 197–207
management-frame attacks, 209–211
man-in-the middle (MITM) attacks, 208–213
overview, 18, 196–197
port stealing, 209
Queensland attack, 217, 229
sniffing for vulnerabilities, 218–222
SNMP vulnerabilities, 213–216
ngrep packet analyzer, 120
NICs (network interface cards). See wireless
NICs (transceivers)
NIST ICAT Metabase, 41, 110
nmap network-mapping tool, 36–37
NMEA (National Marine Electronics
Association) GPS protocol, 62
non-technical attacks, 17
Norton All-in-One Desk Reference For
Dummies (Chase), 46
null sessions (Windows)
countermeasures, 111–112
defined, 106
finding shares, 107–109
getting information from, 107
mapping, 106–107
• O •
Observer packet analyzer, 120
OCTAVE (Operationally Critical Threat,
Asset, and Vulnerability Evaluation)
standard, 27
Odyssey 802.1X client software (Funk
Software), 289
omnidirectional antennae, 13, 60–61, 94
104-bit (128-bit) encryption, 256, 258
Open Information System Security Group, 27
Open Source Security Testing Methodology
Manual (OSSTMM) standard, 28–30
open-system authentication, 282
operating systems. See emulation software;
specific operating systems
Operationally Critical Threat, Asset, and
Vulnerability Evaluation (OCTAVE)
standard, 27
Organizationally Unique Identifiers (OUI), 144
ORiNOCO
Client Manager software, 184–185
wireless NICs, 59, 109–110
Osborne, Mark “Fat Bloke”
(programmer), 249
OSSTMM (Open Source Security Testing
Methodology Manual) standard, 28–30
OUI (Organizationally Unique Identifiers), 144
• P •
packet analyzers. See sniffers (network
analyzers)
packet-injection tools, 235–237, 240. See also
AP overloading
Packetyzer packet analyzer, 120
parabolic grid antennae, 92
partitioning software, 45–46
PartitionMagic (Symantec), 46
passive attack decryption for WEP, 264
passwords
cracking tools, 338–339
dangers of weak, 77–78
dictionary files and word lists, 339
downloading Hacking For Dummies chapter
on, 78, 107
searching the Internet for, 71
social engineering to obtain, 71, 73
SSIDs versus, 126
Patent and Trademark Office Web site, 33
PDAs (personal digital assistants), 44–45
30_597302_bindex.qxd 8/4/05 7:27 PM Page 357
Zobrazit stránku 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16

Komentáře k této Příručce

Žádné komentáře