Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Wi-Foo

Авторы: Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A.

Аннотация:

The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack — or protect — any wireless network. The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless 'citadels''including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 592

Добавлена в каталог: 18.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Encryption cracking tools, retrieving WEP keys stored on client hosts      
Encryption cracking tools, to attack 802.1x authentication systems      2nd 3rd
Encryption cracking tools, traffic injection tools to accelerate WEP cracking      2nd
Encryption cracking tools, WEP crackers      2nd 3rd 4th 5th 6th 7th 8th
Encryption, hybrid      
Equivalent isotropically radiated power (EIRP)      2nd
ESSIDs      
ESSIDs, bypassing closed      2nd 3rd
ESSIDs, closed, role of      2nd
Ethereal      
ettercap      2nd 3rd 4th 5th 6th 7th 8th
Ettercap, Events, categorizing suspicious      2nd 3rd 4th
fakeap      2nd
fata_jack      2nd
Feistel cipher      
Feistel, Horst      
Ferguson, Niels      2nd
Festchook, Roman      
File2air      2nd 3rd 4th 5th
Fingerprinting      2nd 3rd
Firewall testing      2nd 3rd
flooding      
Flooding, channel tools      
Flooding, with deassociate frames      2nd 3rd 4th
Flooding, with deauthentication frames      2nd
Fluhrer, Scott      2nd
FMS (Fluhrer, Mantin, and Shamir) attacks      2nd 3rd 4th 5th 6th 7th
Frame deletion attacks      
Frame-generating tools      
Frame-generating tools, AirJack      2nd 3rd 4th
Frame-generating tools, FakeAP      2nd
Frame-generating tools, File2air      2nd
Frame-generating tools, Libwlan      2nd 3rd
Frame-generating tools, Void      2nd 3rd
Frame-generating tools, Wnet      2nd
Frames, analysis of      
Free space path loss      
FreeBSD      2nd
FreeRADIUS      
FreeRADIUS, installing and configuring      2nd 3rd 4th 5th 6th 7th
FreeRADIUS, integration      2nd 3rd
FreeS/WAN (secure wide area network)      
FreeS/WAN, compilation      2nd 3rd 4th 5th 6th
FreeS/WAN, configuration      2nd 3rd 4th 5th 6th 7th
FreeS/WAN, key generation      2nd 3rd
FreeS/WAN, parameters      2nd 3rd
FreeS/WAN, X.509 certificate generation      2nd
FTP      
Gateway resilience protocols, analysis of      2nd
Gateway security      2nd 3rd 4th 5th 6th 7th
Generic Routing Encapsulation (GRE)      
Ghost Port Scan      2nd
Gilmore, John      
Global Secure Systems      
GNU-radius      
Google      
GPE Palmtop Environment      
GPRS phones      
gpsdrive      2nd 3rd 4th 5th
Gpsmap      2nd 3rd
GQ client      2nd
Greping data      
GSM phones      
Gtkskan      
H1kari      
Hard problem      2nd
hash functions      2nd 3rd 4th 5th 6th 7th 8th 9th
HAVAL      
Hellman, Martin      
Hermes chipset      2nd 3rd
HermesAP      
Hills, Roy      
HMAC      2nd
Honeypots and honeynets      2nd
Host-to-host VPN      2nd
Host-to-network VPN      2nd 3rd
HostAP drivers      2nd 3rd 4th 5th 6th
HostAP drivers, installing and setting      2nd
Hosts      
Hosts, hijacking names      2nd
Hosts, identifying      2nd 3rd
Hosts, scanning and exploiting      2nd 3rd 4th
Hot Standby Router Protocol (HSRP)      
HTTP      
Hunt      2nd
Hydra      
IBM      
IBM, 802.11 security testing software      2nd
IBM, MARS      2nd 3rd 4th
ICMP      
ICMP, redirect attacks      
ICQ      
ICRADIUS      
IDEA (International Data Encryption Algorithm)      2nd 3rd 4th 5th
IDS      [See Intrusion detection systems]
ifconfig      
IGRP      
IKE (Internet Key Exchange) manglers      2nd 3rd 4th 5th
IKE-scan      2nd 3rd 4th 5th
IKECrack      
IKEProber.pl      2nd 3rd 4th 5th
IMAP      
Immunix      
Infrared Data Association (IrDA) PANs      
InProcomm IPN      
Insecurity, scope of      2nd 3rd
Integrity law      
Intel PRO/Wireless (Centrino)      
Interference      2nd
Internet Key Exchange (IKE)      2nd 3rd 4th 5th
Intersil, Inc      
Intrusion detection systems (IDS)      
Intrusion detection systems (IDS), analysis of      2nd 3rd
Intrusion detection systems (IDS), attack signatures      2nd 3rd 4th 5th 6th 7th
Intrusion detection systems (IDS), categorizing suspicious events      2nd 3rd 4th
Intrusion detection systems (IDS), commercial wireless      2nd 3rd
Intrusion detection systems (IDS), knowledge-based      2nd
Intrusion detection systems (IDS), Open Source settings and configuration      2nd 3rd 4th
Intrusion detection systems (IDS), sensor construction      2nd 3rd 4th 5th
Intrusion detection systems (IDS), signature-based      
iPAQs      2nd
IPSec Key Exchange and Management Protocol (ISAKMP)      
IPSec protocol      2nd
IPSec protocol, attacking      2nd 3rd 4th 5th 6th
IPSec protocol, Authentication Header (AH)      2nd 3rd 4th
IPSec protocol, components of      
IPSec protocol, Dead Peer Discovery (DPD)      2nd
IPSec protocol, development of      
IPSec protocol, Encapsulating Security Payload (ESP)      2nd 3rd 4th
IPSec protocol, FreeS/WAN      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
IPSec protocol, Internet Key Exchange (IKE)      2nd 3rd 4th 5th
IPSec protocol, IP compression      2nd 3rd
IPSec protocol, operation modes      2nd
IPSec protocol, opportunistic encryption      
IPSec protocol, Perfect Forward Secrecy (PFS)      
IPSec protocol, security associations      2nd
IPSec protocol, VPN      2nd 3rd
IPSec protocol, Windows      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
IPX      
IRC      
Irdaping      
IRPAS      2nd
Isomair Wireless Sentry      2nd
ISS      
iwconfig      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
iwevent      
iwgetid      
iwlist      2nd 3rd 4th 5th 6th
iwlist, tools that use scan command      2nd 3rd
iwpriv      2nd 3rd 4th 5th
iwspy      
Jamming      
Java Development Kit (JDK)      2nd
Jean's Tourrilhes      
Jean's Tourrilhes, Linux Wireless Extensions      
John the Ripper      2nd
Keinert, Joachim      
Keli, Mi      
Kerberos authentication services      
Kerckhoff's cipher      
Kernel compilation      2nd
Key ciphers, running      
Key distribution      
Key schedule algorithm      
Key-encrypting keys (KEKs)      
Killmon utility      
Kismet      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
Knudsen, Lars      
kracker_jack      
L2TP      [See Layer Two Tunneling Protocol]
Lai, Xuejia      
laptops      2nd 3rd
Layer Two Tunneling Protocol (L2TP)      2nd
LDAP (Lightweight Directory Access Protocol)      
LDAP, centralizing authentication with      2nd 3rd 4th 5th 6th 7th
LDAP, client/server model      2nd
LDAP, defined      2nd
LDAP, directory structure      2nd
LDAP, migration tools      2nd 3rd
LDAP, mobile users and      2nd
LDAP, OpenLDAP, configuration of      2nd 3rd 4th 5th
LDAP, OpenLDAP, installation of      2nd 3rd
LDAP, related tools      2nd 3rd 4th
LDAP, testing      2nd 3rd
LDAP, Tool      
LdapExplorer      2nd
ldapsearch      2nd
leap      2nd 3rd
Leapcrack      2nd
Libradiate      2nd
Libwlan      2nd 3rd 4th
LIDS      2nd
Linux      2nd 3rd
Linux Wireless Extensions      2nd 3rd 4th 5th 6th
Linux, making client card work with      2nd 3rd 4th 5th 6th 7th
Linux, supplicants      2nd 3rd
linux-wlan-ng      
linux-wlan-ng, utilities      2nd 3rd 4th 5th
Linuxant DriverLoader      
Litty, Lionel      
LM/NTLMv1 Windows authentication hashes      
local area networks (LANs)      
Lucent Technologies      
Lucent Technologies, Hermes chipset      
Lucent Technologies, Orinoco Client Manager      
Lucent Technologies, RegCrypto utility      
Lucifer cipher      
MAC filtering      2nd
MAC filtering, bypassing      2nd
MAC filtering, role of      
macfld.pl      
macof      
Madwifi drivers      2nd 3rd
Malloc() fwscrape      2nd
man-in-the-middle attacks      2nd 3rd
Man-in-the-middle attacks, combining layers      2nd
Man-in-the-middle attacks, Physical Layer      2nd
Mantin, Itsik      2nd
MARS      2nd 3rd 4th 5th 6th 7th 8th
Massey, James      
McKay, Raymond      
MD      2nd 3rd 4th 5th
Mdcrack      2nd
Mesh VPN      
Michael (MIC)      2nd 3rd 4th 5th
Microsoft Corp      
Microsoft Corp, Layer 2 Tunneling Protocol (L2TP)      2nd
Microsoft Corp, MS-CHAP      2nd 3rd
Microsoft Corp, Point-to-Point Tunneling Protocol (PPTP)      2nd 3rd
migration tools      2nd
Mimic functions      
MiniStumbler      2nd 3rd
Mognet      2nd
monkey_jack utility      2nd
MS-CHAP      2nd 3rd
Mudge, Dr      2nd
Nai Sniffer Wireless      2nd
National Institute of Standards and Technology (NIST)      
National Security Agency (NSA)      2nd
NdisWrapper      
Nemesis      2nd
Nessus      2nd 3rd 4th
NetBSD      [See BSD]
netsed      
NetStumbler      2nd 3rd 4th 5th 6th 7th 8th
Network Access Server (NAS)      
Network-to-network VPN      2nd 3rd 4th
Neutrino Distributed 802.11b Sensor      
Newsham, Mike      
Newsham, Tim      
NFS, sniffing out      
nmap      
NoCat      2nd 3rd 4th 5th 6th 7th 8th
NTP traffic      
Omen      
omerta utility      2nd 3rd
One-time pads      
One-way (hash) functions      2nd
Open message format      
Open Palmtop Integrated Environment (OPIE)      
Open source      2nd
OpenBSD      2nd
OpenLDAP      
OpenLDAP, configuration of      2nd 3rd 4th 5th
OpenLDAP, installation of      2nd 3rd
OpenRADIUS      
OpenVPN      2nd
Operating system fingerprinting      
Orinoco AP-2000, access point configuration example      2nd 3rd
Orinoco Gold      
Osborne, Mark      2nd
OSPF      
Output Feedback (OFB) mode      2nd
P0f      
Packet integrity preservation      
Packets, EAP      
Packets, RADIUS      
Packets, RADIUS, formats      2nd
Packets, RADIUS, types      2nd
Packetstorm Security      
Packetyzer/Ethereal      
Packetyzer/Ethereal, PADL, migration tools      2nd 3rd
passifist      
Passwords      2nd 3rd
PC-      2nd
PCMCIA Card      
PCMCIA card, cradles      
PCMCIA card, SSIDs, default      2nd 3rd 4th
PCMCIA-cs configuration      2nd 3rd
PDAlert      
PDAs      2nd 3rd
pdump      2nd 3rd
penetration testing      2nd
Penetration testing, bridges for      2nd 3rd 4th 5th 6th
Penetration testing, kit components      2nd 3rd
Penetration testing, stealth levels while      2nd
Penetration testing, template      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
Per-packet key mixing function      2nd 3rd 4th
Perfect Forward Secrecy (PFS)      
Perl script      2nd 3rd
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте