Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   

Поиск по указателям

Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo

Обсудите книгу на научном форуме

Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter

Название: Wi-Foo

Авторы: Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A.


The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack — or protect — any wireless network. The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless 'citadels''including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more.

Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 592

Добавлена в каталог: 18.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
Предметный указатель
3DES      2nd 3rd
802.11 wireless network
802.11 wireless network, frames, analysis of
802.11 wireless network, future of security      2nd
802.11 wireless network, reasons for focusing on      2nd 3rd 4th
802.11 wireless network, SSIDs, default      2nd 3rd 4th
802.11 wireless network, use of term
802.11a client adapters      2nd
802.11b client adapters      2nd 3rd 4th 5th 6th
802.11i standard      2nd 3rd 4th 5th 6th 7th 8th 9th
802.11i standard, attacks against implementations      2nd
802.11i standard, per-packet key mixing function      2nd 3rd 4th
802.1x authentication systems      
802.1x authentication systems, access point configuration, Orinoco AP-2000 example      2nd 3rd
802.1x authentication systems, certificates, creating      2nd 3rd
802.1x authentication systems, description of      2nd 3rd 4th
802.1x authentication systems, EAP-TLS, basics of      2nd 3rd 4th 5th
802.1x authentication systems, EAP-TLS, enable      2nd 3rd
802.1x authentication systems, supplicants      2nd 3rd 4th 5th 6th
802.1x authentication systems, tools to attack      2nd 3rd
AAA framework      2nd
Access point association, filling up      
Access point configuration, Orinoco AP-2000 example      2nd 3rd 4th 5th
Access point deployment      
Access point deployment, rogue      2nd 3rd
Access point deployment, security of      
Access point management utilities      2nd 3rd
accounting      2nd
Accounting logparser      
Active scanning      2nd 3rd 4th
ADM8211 chipset      2nd 3rd
ADMtek, Inc      
AES      2nd 3rd 4th
AES, MARS      2nd 3rd 4th 5th 6th 7th 8th
AES, RC6      2nd 3rd 4th 5th 6th 7th
AES, Rijndael      2nd 3rd 4th 5th
AES, Serpent      2nd 3rd 4th 5th 6th 7th
AES, Twofish      2nd 3rd 4th 5th 6th 7th 8th
Agere/Proxim WEPPlus      
AirDefense Guard      
Airfart      2nd
AirJack      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
AirMagnet (Java sniffer)      
AirMagnet monitoring utility      2nd
Aironet chipset      2nd 3rd 4th 5th 6th
Airopeek      2nd 3rd
Airscanner Mobile Sniffer      
Airtraf      2nd 3rd
Aleph One      
Amplifiers      2nd
ancontrol      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Anderson, Ross      
Anger      2nd
Angst      2nd
Antennas, gain      2nd
Antennas, irradiation pattern diagrams      2nd 3rd 4th 5th
Antennas, polarization      2nd
Antennas, positioning      2nd 3rd
Antennas, selecting      2nd 3rd 4th
Antennas, types of      2nd
AOL Instant Messenger      
AP Hopper      
Ap-mrtg      2nd
Aphunter      2nd 3rd
Apple AirPort      
Apradar      2nd 3rd
Asleap-imp      2nd
asymmetric cryptography      2nd 3rd 4th 5th 6th 7th 8th 9th
Atheros chipset      2nd 3rd
Atmel chipset      
Attack signatures      2nd 3rd 4th 5th 6th 7th
Attack, planning the      
Attack, planning the, battery power management and estimation      2nd
Attack, planning the, penetration testing kit      2nd 3rd
Attack, planning the, search, conducting an extensive      2nd 3rd
Attack, planning the, site survey issues      2nd 3rd 4th
Attack, planning the, stealth levels while penetration testing      2nd
Attack, planning the, timing      2nd
Attack, planning the, walk-through, conducting a      2nd
Attacking, authentication systems      2nd 3rd 4th 5th
Attacking, bridges for penetration testing      2nd 3rd 4th 5th 6th
Attacking, brute-force      2nd
Attacking, bypassing closed ESSIDs, Mac, and protocol filtering      2nd 3rd 4th 5th 6th
Attacking, combining layers      2nd
Attacking, connectivity      
Attacking, DoS attacks against EAP      
Attacking, DoS attacks, methods of      2nd 3rd 4th 5th 6th 7th
Attacking, easiest way      2nd 3rd 4th 5th 6th 7th
Attacking, FMS attacks      2nd 3rd 4th 5th 6th
Attacking, honeypot trap      
Attacking, man-in-the-middle      2nd 3rd 4th 5th 6th
Attacking, Physical Layer      2nd 3rd
Attacking, reachability      
Attacking, replaying      
Attacking, rogue access point deployment      2nd 3rd 4th 5th 6th 7th 8th
Attacking, TKIP and PSK keys      2nd 3rd
Attacking, traffic injections      
Attacking, VPNs      2nd 3rd 4th 5th 6th 7th
Attacking, wired systems      2nd 3rd 4th 5th 6th
Authentication      2nd 3rd 4th
Authentication Header (AH)      2nd 3rd 4th
Authentication, buffers, filling up      
Authentication, frame attacks, spoofed malformed      2nd
Authentication, protocols, analysis of      2nd 3rd
Authentication, systems attacks      2nd 3rd 4th 5th
Authenticator attacks, RADIUS      
Authenticator attacks, RADIUS, request      
Authenticator attacks, RADIUS, response      
Authorization      2nd
Avalanche effect      
Bandwidth snatchers      
Banyan VINES      
Battery power management and estimation      2nd
Bell-LaPadula model of security systems      
Berkeley Varitronics Systems      
Berkeley Varitronics Systems, drivers      
Biba model of security systems      2nd
Biham, Eli      
Birthday attacks      
Black Hats      2nd
Blowfish      2nd 3rd 4th 5th
Bluetooth      2nd
Bridges for penetration testing      2nd 3rd 4th 5th 6th
Broadcom AirForce      
brute-force      2nd
BSD      2nd
BSD, configuring wireless client cards on      2nd 3rd 4th
BSD, discovery and traffic logging tools      2nd 3rd 4th 5th
BSD, list of supported wireless cards in      2nd 3rd
BSD, making client cards work with      2nd 3rd 4th 5th 6th 7th 8th 9th
Cables      2nd
Caesar's cipher      
CCMP      2nd 3rd
Certicom and Funk Software      
Certificates, creating      2nd 3rd
Channels      2nd
Channels, flooding      
Chipsets, selecting      2nd 3rd 4th 5th 6th 7th 8th
Cipher Block Chaining (CBC) mode      2nd 3rd
Cipher counter mode (CCM)      
Cipher Feedback (CFB) mode      2nd
ciphers      [See Cryptography]
Ciphers, asymmetric      2nd 3rd 4th 5th 6th 7th
Ciphers, selecting      2nd 3rd 4th 5th
Ciphers, structure and operation modes      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
Cisco, Inc      
Cisco, Inc, Aironet chipset      2nd 3rd 4th 5th 6th
Cisco, Inc, catalyst switches      2nd 3rd 4th 5th 6th
Cisco, Inc, Centralized Key Management (CCKM)      
Cisco, Inc, Discovery Protocol (CDP)      
Cisco, Inc, EAP-LEAP      2nd 3rd 4th 5th 6th
Cisco, Inc, Hot Standby Router Protocol (HSRP)      
Cisco, Inc, Key Integrity Protocol (CKIP)      
Cisco, Inc, Layer 2 Tunneling Protocol (L2TP)      2nd 3rd
Cisco, Inc, Message Integrity Check (CMIC)      
Cisco, Inc, SAFE      2nd
Cisco, Inc, Virtual Router Resilience Protocol (VRRP)      2nd
Cisco, Inc, Vulnerability Scanner      
Client cards      
Client cards, configuring      2nd 3rd 4th
Client cards, Linux and NetBSD with      2nd 3rd 4th 5th 6th 7th
Client/server model      
Client/server model, LDAP      2nd
Client/server model, RADIUS      2nd 3rd
Compact Flash (CF) cards      
Compaq's iPAQs      
Compression, IP      2nd 3rd
Configuration of client cards      
Connection-oriented protocol links      
Connectors      2nd
Cryptography, AES      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
Cryptography, asymmetric      2nd 3rd 4th 5th 6th 7th 8th 9th
Cryptography, basics      2nd 3rd 4th 5th 6th 7th
Cryptography, between DES and AES      2nd 3rd 4th 5th 6th 7th
Cryptography, cipher structure and operation modes      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
Cryptography, defined      
Cryptography, hash (one-way) functions      2nd
Cryptography, selecting ciphers      2nd 3rd 4th 5th
Cryptography, streaming algorithms      2nd 3rd
CVS driver, obtaining      
Dach0den Labs      2nd 3rd
Daemen, Joan      
Data Encryption Standard      [See DES]
Data transmission, analysis of plaintext      2nd 3rd
Dead Peer Discovery (DPD)      2nd
Deassociate frames, flooding with      2nd 3rd 4th
Deauthentication frames, flooding with      2nd
Decibels, converting watts to      2nd 3rd
default settings      
Defcon 2003 wardrive      
DES (Data Encryption Standard)      
DES, 3DES      2nd 3rd
DES, description of      2nd 3rd 4th 5th 6th
DHCP      2nd
Diffie, Whitfield      
Diffie-Hellman (DH) system      
Digital certificates      
Digital envelopes      
Digital Signature Algorithm (DSA)      2nd
Digital signatures      2nd
dinject      2nd 3rd
dinject-deauth utility      
dinject-disas utility      
Directories, LDAP      2nd
Directories, purpose of      
Directory Administrator      2nd
Discovery methods      
Discovery methods, active scanning      2nd 3rd 4th
Discovery methods, Airfart      2nd
Discovery methods, Airtraf      2nd 3rd
Discovery methods, BSD tools      2nd 3rd 4th 5th
Discovery methods, Gtkskan      
Discovery methods, iwlist scan command      2nd 3rd
Discovery methods, Kismet      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Discovery methods, miscellaneous command-line scripts and utilities      2nd 3rd 4th 5th 6th
Discovery methods, Mognet      2nd
Discovery methods, RF signal strength monitoring tools      2nd 3rd
Discovery methods, Wellenreiter      2nd
Discovery methods, WifiScanner      2nd
DNS spoofing      2nd
DoS attacks      
DoS attacks, against 802.11i implementations      2nd
DoS attacks, against EAP      
DoS attacks, based on settings      2nd
DoS attacks, filling up access point association and authentication buffers      
DoS attacks, frame deletion      
DoS attacks, Physical Layer or jamming      
DoS attacks, spoofed deassociation and deauthentication frames floods      2nd
DoS attacks, spoofed malformed authentication frame      2nd
drivers      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Dsniff, webspy      
DStumbler      2nd 3rd 4th 5th
Duntze, Charles      
Dwepcrack      2nd
Dweputils      2nd
EAP, authentication systems attacks      2nd 3rd 4th 5th
EAP, DoS attacks against      
EAP, frame exchange      2nd
EAP-LEAP      2nd 3rd 4th 5th 6th
EAP-MD5      2nd 3rd
EAP-PEAP      2nd 3rd
EAP-TLS      2nd
EAP-TLS, basics of      2nd 3rd 4th 5th
EAP-TLS, enable      2nd 3rd
EAP-TLS, packet format      
EAP-TTLS      2nd 3rd
EAPOL      2nd
EIRP      2nd
Electronic Codebook (ECB) mode      
Electronic Frontier Foundation (EFF)      2nd
ElGamal      2nd
Elliptic curves      2nd 3rd
encapsulating security payload (ESP)      2nd 3rd
Encrypted traffic injection tools      2nd 3rd 4th 5th 6th
Encryption cracking tools      
1 2 3
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2022
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте