
348
Hacking Wireless Networks For Dummies
Antritsu RF generators, 64
anwrap LEAP-cracking tool, 293
AP overloading
association and authentication attacks,
234–240
open authentication phases and, 234–235
packet-injection tools for, 235–237, 240
testing for, 235–237
unintentional, 240–241
AP Scanner wardriving software, 173
application mapping (Linux), 105
APs (access points). See also AP overloading;
SSIDs (service-set identifiers);
unauthorized equipment
common client vulnerabilities, 104–105
default settings, 76–77
defined, 11
enumeration of SNMP on, 214–216
evil twins, 286
fake (honeypots), 74, 175–176
rogue APs, 178
searching the Internet for yours, 34–35, 71
signal strength adjustment, 94–95
WEP encryption settings, 258–259
on Wi-Fi databases, 34–35
APsniff wardriving software, 173
ARIN (American Registry for Internet
Numbers), 35
ARP (Address Resolution Protocol)
ARP-poisoning attacks, 209, 211–213
Network Scanner for ARP lookups, 100
arping tool, 126
Arpmim MITM software, 209
arpwatch (LBL), 129
The Art of War (Sun Tzu), 155
asleap LEAP-cracking tool, 291–292
attenuators, 94
Auditor Linux, 119
Auditor Security Collection (Knoppix), 236,
274, 297–299
authentication
association and authentication attacks,
234–240
Auditor Security Collection for testing,
297–299
countermeasures, 293–299
cracking LEAP, 290–293
deauthentication attacks, 242–250
defined, 281
EAP (Extensible Authentication Protocol),
284–288, 297
802.11 methods, 282–283
802.1X implementation, 288–290
frame authentication lacking in 802.11, 226
MAC (message authentication code), 257
open-system, 282
shared-key, 282–284
states of, 281–282
VPNs for, 295–296
WDMZ setup, 297
WPA for, 293–294
WPA2 for, 294–295
• B •
bandwidth, limiting, 253
baseline usage, establishing, 251
Basic Service Set (BSS) configuration, 179
Basic SSID (BSSID), 132. See also MAC
(media-access control) addresses
beacon packets of unauthorized systems, 182
Beaver, Kevin
Hacking For Dummies, 2, 14, 19, 33, 56, 78,
107, 111
Hacking Wireless Networks For Dummies, 1–6
Bluesocket IDS system, 80
Bochs emulation software, 46
bounds of network. See determining network
bounds
broadcasts
beacon, increasing intervals, 175
SSID, disabling, 13, 129
BSD-Airtools wardriving software, 173
BSS (Basic Service Set) configuration, 179
BSSID (Basic SSID), 132. See also MAC (media-
access control) addresses
• C •
cables, 304
Cain & Abel password recovery tool, 120–124
candy security, 68
cantennae, 60, 62
Capsa packet analyzer, 119
caret-M (^M) character ending text files, 49
Casio MIPS PDA, 44
CD distributions of Linux, 55–56
CENiffer packet analyzer, 119
CERT (Computer Emergency Response
Team), 27
certifications, 327
Chappell, Laura (troubleshooting book
author), 130
Chase, Kate (Norton All-in-One Desk Reference
For Dummies), 46
30_597302_bindex.qxd 8/4/05 7:27 PM Page 348
Komentáře k této Příručce