Авторизация
Поиск по указателям
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Wi-Foo
Авторы: Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A.
Аннотация: The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack — or protect — any wireless network. The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless 'citadels''including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2004
Количество страниц: 592
Добавлена в каталог: 18.05.2005
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Encryption cracking tools, retrieving WEP keys stored on client hosts
Encryption cracking tools, to attack 802.1x authentication systems 2nd 3rd
Encryption cracking tools, traffic injection tools to accelerate WEP cracking 2nd
Encryption cracking tools, WEP crackers 2nd 3rd 4th 5th 6th 7th 8th
Encryption, hybrid
Equivalent isotropically radiated power (EIRP) 2nd
ESSIDs
ESSIDs, bypassing closed 2nd 3rd
ESSIDs, closed, role of 2nd
Ethereal
ettercap 2nd 3rd 4th 5th 6th 7th 8th
Ettercap, Events, categorizing suspicious 2nd 3rd 4th
fakeap 2nd
fata_jack 2nd
Feistel cipher
Feistel, Horst
Ferguson, Niels 2nd
Festchook, Roman
File2air 2nd 3rd 4th 5th
Fingerprinting 2nd 3rd
Firewall testing 2nd 3rd
flooding
Flooding, channel tools
Flooding, with deassociate frames 2nd 3rd 4th
Flooding, with deauthentication frames 2nd
Fluhrer, Scott 2nd
FMS (Fluhrer, Mantin, and Shamir) attacks 2nd 3rd 4th 5th 6th 7th
Frame deletion attacks
Frame-generating tools
Frame-generating tools, AirJack 2nd 3rd 4th
Frame-generating tools, FakeAP 2nd
Frame-generating tools, File2air 2nd
Frame-generating tools, Libwlan 2nd 3rd
Frame-generating tools, Void 2nd 3rd
Frame-generating tools, Wnet 2nd
Frames, analysis of
Free space path loss
FreeBSD 2nd
FreeRADIUS
FreeRADIUS, installing and configuring 2nd 3rd 4th 5th 6th 7th
FreeRADIUS, integration 2nd 3rd
FreeS/WAN (secure wide area network)
FreeS/WAN, compilation 2nd 3rd 4th 5th 6th
FreeS/WAN, configuration 2nd 3rd 4th 5th 6th 7th
FreeS/WAN, key generation 2nd 3rd
FreeS/WAN, parameters 2nd 3rd
FreeS/WAN, X.509 certificate generation 2nd
FTP
Gateway resilience protocols, analysis of 2nd
Gateway security 2nd 3rd 4th 5th 6th 7th
Generic Routing Encapsulation (GRE)
Ghost Port Scan 2nd
Gilmore, John
Global Secure Systems
GNU-radius
Google
GPE Palmtop Environment
GPRS phones
gpsdrive 2nd 3rd 4th 5th
Gpsmap 2nd 3rd
GQ client 2nd
Greping data
GSM phones
Gtkskan
H1kari
Hard problem 2nd
hash functions 2nd 3rd 4th 5th 6th 7th 8th 9th
HAVAL
Hellman, Martin
Hermes chipset 2nd 3rd
HermesAP
Hills, Roy
HMAC 2nd
Honeypots and honeynets 2nd
Host-to-host VPN 2nd
Host-to-network VPN 2nd 3rd
HostAP drivers 2nd 3rd 4th 5th 6th
HostAP drivers, installing and setting 2nd
Hosts
Hosts, hijacking names 2nd
Hosts, identifying 2nd 3rd
Hosts, scanning and exploiting 2nd 3rd 4th
Hot Standby Router Protocol (HSRP)
HTTP
Hunt 2nd
Hydra
IBM
IBM, 802.11 security testing software 2nd
IBM, MARS 2nd 3rd 4th
ICMP
ICMP, redirect attacks
ICQ
ICRADIUS
IDEA (International Data Encryption Algorithm) 2nd 3rd 4th 5th
IDS [See Intrusion detection systems]
ifconfig
IGRP
IKE (Internet Key Exchange) manglers 2nd 3rd 4th 5th
IKE-scan 2nd 3rd 4th 5th
IKECrack
IKEProber.pl 2nd 3rd 4th 5th
IMAP
Immunix
Infrared Data Association (IrDA) PANs
InProcomm IPN
Insecurity, scope of 2nd 3rd
Integrity law
Intel PRO/Wireless (Centrino)
Interference 2nd
Internet Key Exchange (IKE) 2nd 3rd 4th 5th
Intersil, Inc
Intrusion detection systems (IDS)
Intrusion detection systems (IDS), analysis of 2nd 3rd
Intrusion detection systems (IDS), attack signatures 2nd 3rd 4th 5th 6th 7th
Intrusion detection systems (IDS), categorizing suspicious events 2nd 3rd 4th
Intrusion detection systems (IDS), commercial wireless 2nd 3rd
Intrusion detection systems (IDS), knowledge-based 2nd
Intrusion detection systems (IDS), Open Source settings and configuration 2nd 3rd 4th
Intrusion detection systems (IDS), sensor construction 2nd 3rd 4th 5th
Intrusion detection systems (IDS), signature-based
iPAQs 2nd
IPSec Key Exchange and Management Protocol (ISAKMP)
IPSec protocol 2nd
IPSec protocol, attacking 2nd 3rd 4th 5th 6th
IPSec protocol, Authentication Header (AH) 2nd 3rd 4th
IPSec protocol, components of
IPSec protocol, Dead Peer Discovery (DPD) 2nd
IPSec protocol, development of
IPSec protocol, Encapsulating Security Payload (ESP) 2nd 3rd 4th
IPSec protocol, FreeS/WAN 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
IPSec protocol, Internet Key Exchange (IKE) 2nd 3rd 4th 5th
IPSec protocol, IP compression 2nd 3rd
IPSec protocol, operation modes 2nd
IPSec protocol, opportunistic encryption
IPSec protocol, Perfect Forward Secrecy (PFS)
IPSec protocol, security associations 2nd
IPSec protocol, VPN 2nd 3rd
IPSec protocol, Windows 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
IPX
IRC
Irdaping
IRPAS 2nd
Isomair Wireless Sentry 2nd
ISS
iwconfig 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
iwevent
iwgetid
iwlist 2nd 3rd 4th 5th 6th
iwlist, tools that use scan command 2nd 3rd
iwpriv 2nd 3rd 4th 5th
iwspy
Jamming
Java Development Kit (JDK) 2nd
Jean's Tourrilhes
Jean's Tourrilhes, Linux Wireless Extensions
John the Ripper 2nd
Keinert, Joachim
Keli, Mi
Kerberos authentication services
Kerckhoff's cipher
Kernel compilation 2nd
Key ciphers, running
Key distribution
Key schedule algorithm
Key-encrypting keys (KEKs)
Killmon utility
Kismet 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
Knudsen, Lars
kracker_jack
L2TP [See Layer Two Tunneling Protocol]
Lai, Xuejia
laptops 2nd 3rd
Layer Two Tunneling Protocol (L2TP) 2nd
LDAP (Lightweight Directory Access Protocol)
LDAP, centralizing authentication with 2nd 3rd 4th 5th 6th 7th
LDAP, client/server model 2nd
LDAP, defined 2nd
LDAP, directory structure 2nd
LDAP, migration tools 2nd 3rd
LDAP, mobile users and 2nd
LDAP, OpenLDAP, configuration of 2nd 3rd 4th 5th
LDAP, OpenLDAP, installation of 2nd 3rd
LDAP, related tools 2nd 3rd 4th
LDAP, testing 2nd 3rd
LDAP, Tool
LdapExplorer 2nd
ldapsearch 2nd
leap 2nd 3rd
Leapcrack 2nd
Libradiate 2nd
Libwlan 2nd 3rd 4th
LIDS 2nd
Linux 2nd 3rd
Linux Wireless Extensions 2nd 3rd 4th 5th 6th
Linux, making client card work with 2nd 3rd 4th 5th 6th 7th
Linux, supplicants 2nd 3rd
linux-wlan-ng
linux-wlan-ng, utilities 2nd 3rd 4th 5th
Linuxant DriverLoader
Litty, Lionel
LM/NTLMv1 Windows authentication hashes
local area networks (LANs)
Lucent Technologies
Lucent Technologies, Hermes chipset
Lucent Technologies, Orinoco Client Manager
Lucent Technologies, RegCrypto utility
Lucifer cipher
MAC filtering 2nd
MAC filtering, bypassing 2nd
MAC filtering, role of
macfld.pl
macof
Madwifi drivers 2nd 3rd
Malloc() fwscrape 2nd
man-in-the-middle attacks 2nd 3rd
Man-in-the-middle attacks, combining layers 2nd
Man-in-the-middle attacks, Physical Layer 2nd
Mantin, Itsik 2nd
MARS 2nd 3rd 4th 5th 6th 7th 8th
Massey, James
McKay, Raymond
MD 2nd 3rd 4th 5th
Mdcrack 2nd
Mesh VPN
Michael (MIC) 2nd 3rd 4th 5th
Microsoft Corp
Microsoft Corp, Layer 2 Tunneling Protocol (L2TP) 2nd
Microsoft Corp, MS-CHAP 2nd 3rd
Microsoft Corp, Point-to-Point Tunneling Protocol (PPTP) 2nd 3rd
migration tools 2nd
Mimic functions
MiniStumbler 2nd 3rd
Mognet 2nd
monkey_jack utility 2nd
MS-CHAP 2nd 3rd
Mudge, Dr 2nd
Nai Sniffer Wireless 2nd
National Institute of Standards and Technology (NIST)
National Security Agency (NSA) 2nd
NdisWrapper
Nemesis 2nd
Nessus 2nd 3rd 4th
NetBSD [See BSD]
netsed
NetStumbler 2nd 3rd 4th 5th 6th 7th 8th
Network Access Server (NAS)
Network-to-network VPN 2nd 3rd 4th
Neutrino Distributed 802.11b Sensor
Newsham, Mike
Newsham, Tim
NFS, sniffing out
nmap
NoCat 2nd 3rd 4th 5th 6th 7th 8th
NTP traffic
Omen
omerta utility 2nd 3rd
One-time pads
One-way (hash) functions 2nd
Open message format
Open Palmtop Integrated Environment (OPIE)
Open source 2nd
OpenBSD 2nd
OpenLDAP
OpenLDAP, configuration of 2nd 3rd 4th 5th
OpenLDAP, installation of 2nd 3rd
OpenRADIUS
OpenVPN 2nd
Operating system fingerprinting
Orinoco AP-2000, access point configuration example 2nd 3rd
Orinoco Gold
Osborne, Mark 2nd
OSPF
Output Feedback (OFB) mode 2nd
P0f
Packet integrity preservation
Packets, EAP
Packets, RADIUS
Packets, RADIUS, formats 2nd
Packets, RADIUS, types 2nd
Packetstorm Security
Packetyzer/Ethereal
Packetyzer/Ethereal, PADL, migration tools 2nd 3rd
passifist
Passwords 2nd 3rd
PC- 2nd
PCMCIA Card
PCMCIA card, cradles
PCMCIA card, SSIDs, default 2nd 3rd 4th
PCMCIA-cs configuration 2nd 3rd
PDAlert
PDAs 2nd 3rd
pdump 2nd 3rd
penetration testing 2nd
Penetration testing, bridges for 2nd 3rd 4th 5th 6th
Penetration testing, kit components 2nd 3rd
Penetration testing, stealth levels while 2nd
Penetration testing, template 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
Per-packet key mixing function 2nd 3rd 4th
Perfect Forward Secrecy (PFS)
Perl script 2nd 3rd
Реклама