Cargando…

Hacking exposed wireless : wireless security secrets & solutions /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Wright, Joshua (Autor), Cache, Johnny (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2015]
Edición:Third edition.
Colección:Hacking Exposed Ser.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Foreword
  • Acknowledgments
  • Introduction
  • Part I Hacking 802.11 Wireless Technology
  • CASE STUDY: Twelve Volt Hero
  • 1 Introduction to 802.11 Hacking
  • 802.11 in a Nutshell
  • The Basics
  • Addressing in 802.11 Packets
  • 802.11 Security Primer
  • Discovery Basics
  • Hardware and Drivers
  • A Note on the Linux Kernel
  • Chipsets and Linux Drivers
  • Modern Chipsets and Drivers
  • Cards
  • Antennas
  • Cellular Data Cards
  • GPS
  • Summary
  • 2 Scanning and Enumerating 802.11 Networks
  • Choosing an Operating System
  • Windows
  • OS X
  • Linux
  • Windows Discovery Tools
  • Vistumbler
  • Windows Sniffing/Injection Tools
  • NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer)
  • AirPcap
  • CommView for WiFi
  • OS X Discovery Tools
  • KisMAC
  • Linux Discovery Tools
  • airodump-ng
  • Kismet
  • Advanced Visualization Techniques (PPI)
  • Visualizing PPI-Tagged Kismet Data
  • PPI-Based Triangulation (Servo-Bot)
  • Summary
  • 3 Attacking 802.11 Wireless Networks
  • Basic Types of Attacks
  • Security Through Obscurity
  • Defeating WEP
  • WEP Key Recovery Attacks
  • Putting It All Together with Wifite
  • Installing Wifite on a WiFi Pineapple
  • Summary
  • 4 Attacking WPA-Protected 802.11 Networks
  • Obtaining the Four-Way Handshake
  • Cracking with Cryptographic Acceleration
  • Breaking Authentication: WPA Enterprise
  • Obtaining the EAP Handshake
  • EAP-MD5
  • EAP-GTC
  • LEAP
  • EAP-FAST
  • EAP-TLS
  • PEAP and EAP-TTLS
  • Running a Malicious RADIUS Server
  • Summary
  • 5 Attacking 802.11 Wireless Clients
  • browser_autopwn: A Poor Man's Exploit Server
  • Using Metasploit browser_autopwn
  • Getting Started with I-love-my-neighbors
  • Creating the AP
  • Assigning an IP Address
  • Setting Up the Routes
  • Redirecting HTTP Traffic
  • Serving HTTP Content with Squid
  • Attacking Clients While Attached to an AP
  • Associating to the Network
  • ARP Spoofing
  • Direct Client Injection Techniques
  • Summary
  • 6 Taking It All the Way: Bridging the Air-Gap from Windows 8
  • Preparing for the Attack
  • Exploiting Hotspot Environments
  • Controlling the Client
  • Local Wireless Reconnaissance
  • Remote Wireless Reconnaissance
  • Windows Monitor Mode
  • Microsoft NetMon
  • Target Wireless Network Attack
  • Summary
  • Part II Bluetooth
  • CASE STUDY: You Can Still Hack What You Can't See
  • 7 Bluetooth Classic Scanning and Reconnaissance
  • Bluetooth Classic Technical Overview
  • Device Discovery
  • Protocol Overview
  • Bluetooth Profiles
  • Encryption and Authentication
  • Preparing for an Attack
  • Selecting a Bluetooth Classic Attack Device
  • Reconnaissance
  • Active Device Discovery
  • Passive Device Discovery
  • Hybrid Discovery
  • Passive Traffic Analysis
  • Service Enumeration
  • Summary
  • 8 Bluetooth Low Energy Scanning and Reconnaissance
  • Bluetooth Low Energy Technical Overview
  • Physical Layer Behavior