Previous Section  < Day Day Up >  Next Section

  
• Table of Contents
• Index
Wi-Foo
By Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky
 
Publisher: Addison Wesley
Pub Date: June 28, 2004
ISBN: 0-321-20217-1
Pages: 592
 


   Copyright
   Acknowledgments
   About the Authors
   Introduction
      Why Does Wi-Foo Exist and for Whom Did We Write It?
      What About the Funky Name?
      How This Book Is Organized
      Chapter 1.  Real World Wireless Security
      Why Do We Concentrate on 802.11 Security?
      Getting a Grip on Reality: Wide Open 802.11 Networks Around Us
      The Future of 802.11 Security: Is It as Bright as It Seems?
      Summary
      Chapter 2.  Under Siege
      Why Are "They" After Your Wireless Network?
      Wireless Crackers: Who Are They?
      Corporations, Small Companies, and Home Users: Targets Acquired
      Target Yourself: Penetration Testing as Your First Line of Defense
      Summary
      Chapter 3.  Putting the Gear Together: 802.11 Hardware
      PDAs Versus Laptops
      PCMCIA and CF Wireless Cards
      Antennas
      RF Amplifiers
      RF Cables and Connectors
      Summary
      Chapter 4.  Making the Engine Run: 802.11 Drivers and Utilities
      Operating System, Open Source, and Closed Source
      The Engine: Chipsets, Drivers, and Commands
      Getting Used to Efficient Wireless Interface Configuration
      Summary
      Chapter 5.  Learning to WarDrive: Network Mapping and Site Surveying
      Active Scanning in Wireless Network Discovery
      Monitor Mode Network Discovery and Traffic Analysis Tools
      Tools That Use the iwlist scan Command
      RF Signal Strength Monitoring Tools
      Summary
      Chapter 6.  Assembling the Arsenal: Tools of the Trade
      Encryption Cracking Tools
      Wireless Frame-Generating Tools
      Wireless Encrypted Traffic Injection Tools: Wepwedgie
      Access Point Management Utilities
      Summary
      Chapter 7.  Planning the Attack
      The "Rig"
      Network Footprinting
      Site Survey Considerations and Planning
      Proper Attack Timing and Battery Power Preservation
      Stealth Issues in Wireless Penetration Testing
      An Attack Sequence Walk-Through
      Summary
      Chapter 8.  Breaking Through
      The Easiest Way to Get in
      A Short Fence to Climb: Bypassing Closed ESSIDs, MAC, and Protocols Filtering
      Picking a Trivial Lock: Various Means of Cracking WEP
      Picking the Trivial Lock in a Less Trivial Way: Injecting Traffic to Accelerate WEP Cracking
      Field Observations in WEP Cracking
      Cracking TKIP: The New Menace
      The Frame of Deception: Wireless Man-in-the-Middle Attacks and Rogue Access Points Deployment
      Breaking the Secure Safe
      The Last Resort: Wireless DoS Attacks
      Summary
      Chapter 9.  Looting and Pillaging: The Enemy Inside
      Step 1: Analyze the Network Traffic
      Step 2: Associate to WLAN and Detect Sniffers
      Step 3: Identify the Hosts Present and Perform Passive Operating System Fingerprinting
      Step 4: Scan and Exploit Vulnerable Hosts on WLAN
      Step 5: Take the Attack to the Wired Side
      Step 6: Check Wireless-to-Wired Gateway Egress Filtering Rules
      Summary
      Chapter 10.  Building the Citadel: An Introduction to Wireless LAN Defense
      Wireless Security Policy: The Cornerstone
      Layer 1 Wireless Security Basics
      The Usefulness of WEP, Closed ESSIDs, MAC Filtering, and SSH Port Forwarding
      Secure Wireless Network Positioning and VLANs
      Deploying a Linux-Based, Custom-Built Hardened Wireless Gateway
      Proprietary Improvements to WEP and WEP Usage
      802.11i Wireless Security Standard and WPA: The New Hope
      Summary
      Chapter 11.  Introduction to Applied Cryptography: Symmetric Ciphers
      Introduction to Applied Cryptography and Steganography
      Modern-Day Cipher Structure and Operation Modes
      Bit by Bit: Streaming Ciphers and Wireless Security
      The Quest for AES
      Between DES and AES: Common Ciphers of the Transition Period
      Selecting a Symmetric Cipher for Your Networking or Programming Needs
      Summary
      Chapter 12.  Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms
      Cryptographic Hash Functions
      Dissecting an Example Standard One-Way Hash Function
      Hash Functions, Their Performance, and HMACs
      Asymmetric Cryptography: A Different Animal
      Summary
      Chapter 13.  The Fortress Gates: User Authentication in Wireless Security
      RADIUS
      Installation of FreeRADIUS
      User Accounting
      RADIUS Vulnerabilities
      RADIUS-Related Tools
      802.1x: The Gates to Your Wireless Fortress
      LDAP
      NoCat: An Alternative Method of Wireless User Authentication
      Summary
      Chapter 14.  Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs
      Why You Might Want to Deploy a VPN
      VPN Topologies Review: The Wireless Perspective
      Common VPN and Tunneling Protocols
      Alternative VPN Implementations
      The Main Player in the Field: IPSec Protocols, Operations, and Modes Overview
      Deploying Affordable IPSec VPNs with FreeS/WAN
      Summary
      Chapter 15.  Counterintelligence: Wireless IDS Systems
      Categorizing Suspicious Events on WLANs
      Examples and Analysis of Common Wireless Attack Signatures
      Radars Up! Deploying a Wireless IDS Solution for Your WLAN
      Summary
      Afterword
      Appendix A.  Decibel–Watts Conversion Table
      Appendix B.  802.11 Wireless Equipment
      Appendix C.  Antenna Irradiation Patterns
      Omni-Directionals:
      Semi-Directionals:
      Highly-directionals
      Appendix D.  Wireless Utilities Manpages
      Section 1.  Iwconfig
      Section 2.  Iwpriv
      Section 3.  Iwlist
      Section 4.  Wicontrol
      Section 5.  Ancontrol
      Appendix E.  Signal Loss for Obstacle Types
      Appendix F.  Warchalking Signs
      Original Signs
      Proposed New Signs
      Appendix G.  Wireless Penetration Testing Template
      Arhont Ltd Wireless Network Security and Stability Audit Checklist Template
      Section 1.  Reasons for an audit
      Section 2.  Preliminary investigations
      Section 3.  Wireless site survey
      Section 4.  Network security features present
      Section 5.  Network problems / anomalies detected
      Section 6.  Wireless penetration testing procedure
      Section 7.  Final recommendations
      Appendix H.  Default SSIDs for Several Common 802.11 Products
      Glossary
   Index
Previous Section  < Day Day Up >  Next Section