Hacking exposed wireless : wireless security secrets & solutions /
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
[2015]
|
Edición: | Third edition. |
Colección: | Hacking Exposed Ser.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents
- Foreword
- Acknowledgments
- Introduction
- Part I Hacking 802.11 Wireless Technology
- CASE STUDY: Twelve Volt Hero
- 1 Introduction to 802.11 Hacking
- 802.11 in a Nutshell
- The Basics
- Addressing in 802.11 Packets
- 802.11 Security Primer
- Discovery Basics
- Hardware and Drivers
- A Note on the Linux Kernel
- Chipsets and Linux Drivers
- Modern Chipsets and Drivers
- Cards
- Antennas
- Cellular Data Cards
- GPS
- Summary
- 2 Scanning and Enumerating 802.11 Networks
- Choosing an Operating System
- Windows
- OS X
- Linux
- Windows Discovery Tools
- Vistumbler
- Windows Sniffing/Injection Tools
- NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer)
- AirPcap
- CommView for WiFi
- OS X Discovery Tools
- KisMAC
- Linux Discovery Tools
- airodump-ng
- Kismet
- Advanced Visualization Techniques (PPI)
- Visualizing PPI-Tagged Kismet Data
- PPI-Based Triangulation (Servo-Bot)
- Summary
- 3 Attacking 802.11 Wireless Networks
- Basic Types of Attacks
- Security Through Obscurity
- Defeating WEP
- WEP Key Recovery Attacks
- Putting It All Together with Wifite
- Installing Wifite on a WiFi Pineapple
- Summary
- 4 Attacking WPA-Protected 802.11 Networks
- Obtaining the Four-Way Handshake
- Cracking with Cryptographic Acceleration
- Breaking Authentication: WPA Enterprise
- Obtaining the EAP Handshake
- EAP-MD5
- EAP-GTC
- LEAP
- EAP-FAST
- EAP-TLS
- PEAP and EAP-TTLS
- Running a Malicious RADIUS Server
- Summary
- 5 Attacking 802.11 Wireless Clients
- browser_autopwn: A Poor Man's Exploit Server
- Using Metasploit browser_autopwn
- Getting Started with I-love-my-neighbors
- Creating the AP
- Assigning an IP Address
- Setting Up the Routes
- Redirecting HTTP Traffic
- Serving HTTP Content with Squid
- Attacking Clients While Attached to an AP
- Associating to the Network
- ARP Spoofing
- Direct Client Injection Techniques
- Summary
- 6 Taking It All the Way: Bridging the Air-Gap from Windows 8
- Preparing for the Attack
- Exploiting Hotspot Environments
- Controlling the Client
- Local Wireless Reconnaissance
- Remote Wireless Reconnaissance
- Windows Monitor Mode
- Microsoft NetMon
- Target Wireless Network Attack
- Summary
- Part II Bluetooth
- CASE STUDY: You Can Still Hack What You Can't See
- 7 Bluetooth Classic Scanning and Reconnaissance
- Bluetooth Classic Technical Overview
- Device Discovery
- Protocol Overview
- Bluetooth Profiles
- Encryption and Authentication
- Preparing for an Attack
- Selecting a Bluetooth Classic Attack Device
- Reconnaissance
- Active Device Discovery
- Passive Device Discovery
- Hybrid Discovery
- Passive Traffic Analysis
- Service Enumeration
- Summary
- 8 Bluetooth Low Energy Scanning and Reconnaissance
- Bluetooth Low Energy Technical Overview
- Physical Layer Behavior