Авторизация
Поиск по указателям
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Wi-Foo
Авторы: Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A.
Аннотация: The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack — or protect — any wireless network. The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless 'citadels''including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2004
Количество страниц: 592
Добавлена в каталог: 18.05.2005
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Perlskan
personal area networks (PANs) 2nd
pGina 2nd 3rd 4th
Physical layer
Physical Layer, attacks 2nd 3rd
Physical Layer, security 2nd 3rd 4th 5th
Pluggable Authentication Module (PAM) 2nd 3rd
PocketWarrior
Point-to-Point Tunneling Protocol (PPTP) 2nd 3rd
pop
port scanning
Power calculations 2nd 3rd 4th
Power-saving mode attacks
Preshard key (PSK) 2nd 3rd 4th
prism
Prism, based cards 2nd
Prism, chipset 2nd 3rd 4th 5th 6th 7th
Prism, monitor headers 2nd 3rd 4th
Prism2ctl 2nd
Prism2dump 2nd
Prismdump 2nd
Prismsnort
Property rule 2nd
Protocol filtering, bypassing 2nd 3rd
Pseudo-random generators (PRNGs) 2nd
Public key algorithm
QA Cafe
RADIUS (Remote Authentication Dial-In User Service) 2nd 3rd
RADIUS, AAA framework 2nd
RADIUS, accounting 2nd
RADIUS, attribute types
RADIUS, features of 2nd
RADIUS, freeRADIUS, installing and configuring 2nd 3rd 4th 5th 6th 7th
RADIUS, freeRADIUS, integration 2nd 3rd
RADIUS, overview of 2nd
RADIUS, packet codes
RADIUS, packet formats 2nd
RADIUS, packet types 2nd
RADIUS, related tools 2nd
RADIUS, vulnerabilities 2nd 3rd
RadiusContext
RadiusReport
RadiusSplit
Rager, Anton T 2nd
rathergood.com
Raw frame sniffing mode 2nd 3rd 4th
RC 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Reachability
Realtek RTL8180L
Redfang
Regulation of Investigatory Powers (RIP) Bill
reinj 2nd 3rd
Remote Access Server (RAS)
RF
RF monitor (RFMON) 2nd 3rd
RF, amplifiers 2nd
RF, antennas 2nd 3rd 4th
RF, cables and connectors 2nd
RF, jamming
RF, power calculations 2nd 3rd 4th
RF, signal strength monitoring tools 2nd 3rd
RFGrabber
Rijmen, Vincent
Rijndael 2nd 3rd 4th
RIPEMD 2nd
RIPv 2nd
Rivest, Ronald 2nd
Rogue access point deployment 2nd 3rd 4th 5th 6th 7th 8th
ROT 2nd 3rd
Routing protocol, analysis of
Routing updates, injecting 2nd
RSA (Rivest, Shamir, Adleman) encryption method 2nd
RSA Data Security, Inc 2nd 3rd 4th
RSA Signature Scheme 2nd
RTS/CTS 2nd 3rd
SAFE 2nd
Satan/Saint/Sara
Savard, John 2nd 3rd
Scanchan
Scanning 2nd 3rd 4th
Schiffman, Mike 2nd
Schneier, Bruce
Schneier, Bruce, Blowfish 2nd 3rd
Schneier, Bruce, Twofish 2nd 3rd 4th
Search, conducting an extensive 2nd 3rd
Secure Digital (SD) cards
Secure message format
Security 2nd [See Cryptography]
security associations (SAs) 2nd
Security, 802.11i standard 2nd 3rd 4th 5th 6th 7th 8th 9th
Security, access point deployment and positioning
Security, audits
Security, Bell-LaPadula model of security systems
Security, Biba model of security systems 2nd
Security, closed ESSIDs 2nd
Security, countermeasures
Security, gateway 2nd 3rd 4th 5th 6th 7th
Security, MAC filtering
Security, monitoring and incident response 2nd
Security, Physical Layer 2nd 3rd 4th 5th
Security, proprietary improvements 2nd 3rd
security, RADIUS 2nd
Security, SSH port forwarding 2nd
Security, updates and registrations
Security, user education and responsibility 2nd
security, VLANs 2nd 3rd 4th 5th
Self-synchronization
SELinux
Senao Long Range
Sensor construction 2nd 3rd 4th 5th
Sentinel 2nd 3rd 4th 5th
Serpent 2nd 3rd 4th 5th 6th 7th
Serpent, SHA,hash (one-way) functions 2nd 3rd
Shamir, Adi 2nd 3rd
Shannon, Claude
Sharp Zaurus 2nd 3rd
Shmoo Group 2nd
Signal loss, obstacle types and
Signal strength
Signal strength, limiting 2nd
Signal strength, monitoring tools 2nd 3rd
Simple Authentication and Security Layer (SASL) 2nd
Simple security rule
Sing
Siphon
Site surveying 2nd
Site surveying, issues 2nd 3rd 4th
slapd
Sleepycat Software Berkeley DBv 2nd
smbproxy
Smoorenburg, Miquel van
Sniffdet 2nd
Sniffer Wireless
Sniffers, detecting 2nd 3rd
SNMP
snmpget
snmpset
snmpwalk
SNR 2nd
Soekris boards
Song, Dug
SourceForge 2nd
Spam 2nd
Spitzner, Lance
Spoofed deassociation and deauthentication frames floods 2nd
Spoofed malformed authentication frame 2nd
SSH 2nd 3rd
SSH, port forwarding 2nd
sshmitm 2nd
sshow
SSHv 2nd
SSIDs, default 2nd 3rd 4th
Ssidsniff
ST-divine
Star VPN
Stealth levels while penetration testing 2nd
Steganography 2nd
Steghide
Stegtunnel
Streaming algorithms 2nd 3rd
Super Sniffer
Supplicants
Supplicants, Linux 2nd 3rd
Supplicants, Windows 2000 and Windows XP 2nd 3rd 4th
Surfing
sw-mitm
Symbol chipset 2nd
Symmetric block cipher
SYN ACK Labs
Synchronous stream cipher
Syslog
Taranis
TCP wrappers
Team Teso
Texas Instruments chipsets
THCrut 2nd
Tiger
TKIP (Temporal Key Integrity Protocol) 2nd 3rd 4th 5th 6th
Traffic indication map (TIM) frame attacks
Traffic injection tools 2nd 3rd 4th 5th 6th 7th 8th 9th
Traffic, analyzing network 2nd 3rd 4th 5th 6th
Transport layer security, OpenLDAP
Trapdoof
traps
Tripwire 2nd
Truth tables
Tunneling protocols 2nd 3rd
Twofish 2nd 3rd 4th 5th 6th 7th 8th 9th
user authentication [See Security;RADIUS]
Vagner Sacramento
Virtual carrier sense-implementing network attacks
Virtual private networks [See Attacking;VPNs]
Virtual Router Resilience Protocol (VRRP) 2nd
VLANs, security and 2nd 3rd 4th 5th
Voice over IP (VOIP) 2nd
void 2nd 3rd 4th 5th 6th
vomit 2nd
VPNs (Virtual Private Networks)
VPNs, attacking 2nd 3rd 4th 5th 6th 7th
VPNs, clPe
VPNs, Open 2nd
VPNs, purpose of 2nd 3rd
VPNs, reasons for deploying 2nd
VPNs, topologies 2nd 3rd 4th 5th 6th 7th 8th 9th
VPNs, tunneling protocols and common 2nd 3rd
VPNs, Vtun
Vtun
warchalking 2nd
Warchalking, signs 2nd
Warclimbing 2nd
Warcycling 2nd
wardialing
Wardrive 2nd 3rd
wardriving
Warwalking 2nd
Watts, converting decibels to 2nd 3rd
Wavemon
Wavesec
Wavestumbler 2nd
Webmitm
websites
Websites, for network footprinting 2nd 3rd
Websites, for power calculations
webspy
Wellenreiter 2nd 3rd 4th 5th 6th
WEP 2nd 3rd
WEP crackers
WEP crackers, AirSnort
WEP crackers, Dweputils 2nd
WEP crackers, WepAttack 2nd
WEP crackers, Wepcrack 2nd 3rd
WEP crackers, Wep_tools 2nd 3rd 4th
WEP cracking
WEP cracking, brute-force 2nd
WEP cracking, field observations in 2nd
WEP cracking, traffic injection tools to accelerate 2nd 3rd
WEP, key length 2nd
WEP, proprietary improvements 2nd 3rd
WEP, tool for retrieving keys stored on client hosts
WepAttack 2nd
Wepcrack 2nd 3rd
Wepwedgie 2nd 3rd 4th 5th 6th
Wep_tools 2nd 3rd 4th
Whitening 2nd
Whiting, Doug
Wi-Fi Alliance
wicontrol 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Wide area networks (WANs)
wIDS 2nd
WIDZ 2nd
WifiScanner 2nd
WildPackets, AiroPeek 2nd 3rd
Windows
Windows XP
Windows XP, probing
Windows XP, scanning service 2nd
Windows XP, supplicants 2nd 3rd 4th
Windows, client setup 2nd 3rd 4th 5th 6th
Windows, IPSec client configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Windows, supplicants 2nd 3rd 4th
Windows, tools for 2nd
Wired systems, attacking 2nd 3rd 4th 5th 6th
Wireless Access Point Utilities for UNIX
wireless hackers
Wireless hackers, targets of 2nd 3rd 4th
Wireless hackers, who are 2nd 3rd
Wireless hacking, reasons for 2nd 3rd 4th
Wireless Network Meter
Wireless Power Meter (wpm)
Wireless Protected Access (WPA) 2nd 3rd 4th 5th 6th 7th
WiSentry
Wistumbler 2nd
wlan-scan
wlancfg 2nd
wlanctl-ng 2nd 3rd
WlanFE
wlanmeter
wlansniff
wlan_jack 2nd
Wnet 2nd
Wright, Joshua 2nd 3rd 4th 5th 6th 7th 8th
X.509 certificate generation 2nd
XORing 2nd
Xtops
XtRADIUS
xwconfig
YALA
YARD RADIUS
YellowJacket and YellowJacket Plus
Zcomax XI-325HP
ZoomAir access points
Реклама