Hacking exposed wireless: wireless security secrets & solutions
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
McGraw-Hill
2007
|
Schlagworte: | |
Online-Zugang: | kostenfrei kostenfrei Inhaltsverzeichnis Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | XXV, 387 S. Ill., graph. Darst. |
ISBN: | 0072262583 9780072262582 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036458546 | ||
003 | DE-604 | ||
005 | 20100602 | ||
007 | t | ||
008 | 100518s2007 ad|| |||| 00||| eng d | ||
010 | |a 2007035664 | ||
020 | |a 0072262583 |9 0-07-226258-3 | ||
020 | |a 9780072262582 |9 978-0-07-226258-2 | ||
035 | |a (OCoLC)728165198 | ||
035 | |a (DE-599)GBV522470572 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-634 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Cache, Johnny |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking exposed wireless |b wireless security secrets & solutions |c Johnny Cache ; Vincent Liu |
264 | 1 | |a New York [u.a.] |b McGraw-Hill |c 2007 | |
300 | |a XXV, 387 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | |a Wireless communication systems / Security measures | |
650 | 0 | |a Wireless LANs / Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Liu, Vincent |e Verfasser |4 aut | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0814/2007035664-b.html |y Contributor biographical information |z kostenfrei | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0814/2007035664-d.html |y Publisher description |z kostenfrei | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0814/2007035664-t.html |z kostenfrei |3 Inhaltsverzeichnis | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/bowker/toc/9780072262582.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020330484&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020330484 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804142948854530048 |
---|---|
adam_text | IMAGE 1
FOREWORD
P. XVII
ACKNOWLEDGMENTS
P. XIX
INTRODUCTION
P. XXI
OVERVIEW
CASE STUDY: BUZZCORP P. 2 WIRELESS SETUP P. 2 WIRELESS RISKS AND
SECURITY CONTROLS P. 2 WIRELESS SECURITY OVERVIEW P. 3 USE AND SPREAD OF
WIRELESS TECHNOLOGIES P. 4 A BRIEF HISTORY OF WIRELESS TECHNOLOGIES P. 5
BASICS OF WIRELESS TECHNOLOGIES P. 5 WHAT IS WIRELESS? P. 5
STANDARDIZATION AND REGULATION P. 6 FURTHER COVERAGE P. 7 THE RISKS OF
WIRELESS TECHNOLOGIES P. 7 ADVANCES IN WIRELESS SECURITY P. 10 SUMMARY
P. 11 RADIO FREQUENCY P. 13 RF TERMINOLOGY P. 14 COMMUNICATIONS SYSTEMS
P. 14 RADIO FREQUENCY SIGNALS P. 17 ELECTROMAGNETIC WAVES P. 19 UNITS OF
MEASURE P. 20 MODULATION P. 24 SPREAD SPECTRUM AND MULTIPLEXING P. 31 RF
HARDWARE P. 35 ANTENNAS P. 36 AMPLIFIERS P. 41 GOVERNMENT REGULATIONS P.
43 WIRELESS STANDARDS P. 44 WIRELESS LAN (802.11 A/B/G/N) P. 45 SUMMARY
P. 50 HACKING 802.11 WIRELESS TECHNOLOGY CASE STUDY: RIDING THE INSECURE
AIRWAVES P. 52 INTRODUCTION TO 802.11 P. 53 802.11 HISTORY P. 54 WI-FI
VS. 802.11 P. 55 802.11 IN A NUTSHELL P. 55 THE 802.11 MAC P. 55
FEATURES OF THE 802.11 MAC P. 56 802.11 PACKET TYPES P. 61
IMAGE 2
CONTROL PACKETS
P. 61
MANAGEMENT PACKETS
P. 62
DATA PACKETS
P. 63
ADDRESSING IN 802.11 PACKETS
P. 63
INTERESTING FIELDS ACROSS PACKETS
P. 64
FINDING AND CONNECTING TO WIRELESS NETWORKS
P. 66
LOCATING WIRELESS NETWORKS
P. 66
CONNECTING TO A WIRELESS NETWORK
P. 67
WPA/802.11I BACKGROUND
P. 68
802.11I GROUNDWORK
P. 69
EXTENSIBLE AUTHENTICATION PROTOCOL (EAP)
P. 70
INTRODUCTION TO RADIUS
P. 73
802.1X: BRINGING EAP TO THE LAN
P. 76
802.11I: PUTTING IT ALL TOGETHER
P. 78
AUTHENTICATION USING 802.11I
P. 78
CONFIDENTIALITY IN 802.11I
P. 84
INTEGRITY IN 802.11I
P. 87
REPLAY PROTECTION IN 802.11I
P. 88
SUMMARY
P. 90
802.11 DISCOVERY
P. 91
DISCOVERY BASICS
P. 92
HARDWARE AND DRIVERS
P. 98
BACKGROUND
P. 99
CHIPSETS
P. 101
CARDS
P. 104
DRIVERS
P. 106
ANTENNAS
P. 117
GPS
P. 120
SUMNARY
P. 123
SCANNING AND ENUMERATING 802.11 NETWORKS
P. 125
CHOOSING AN OPERATING SYSTEM
P. 126
WINDOWS
P. 126
LINUX
P. 126
OS X
P. 127
WINDOWS DISCOVERY TOOLS
P. 127
NETSTUMBLER
P. 127
AIROPEEK
P. 140
LINUX DISCOVERY TOOLS
P. 146
KISMET
P. 147
WELLENREITER
P. 153
OS X DISCOVERY TOOLS
P. 154
IMAGE 3
KISMAC
P. 154
MACSTUMBLER
P. 159
ISTUMBLER
P. 160
KISMET ON OS X
P. 161
ONLINE MAPPING SERVICES (WIGLE, .KISMAC, GOOGLE EARTH)
P. 161
NETWORK IDENTIFIERS
P. 162
UNIX SNIFFERS
P. 163
DISPLAYING A SAVED PCAP FILE
P. 164
CAPTURING PACKETS IN REAL-TIME
P. 164
WIRESHARK COLORS
P. 165
SUMMARY
P. 166
ATTACKING 802.11 NETWORKS
P. 167
BASIC TYPES OF ATTACKS
P. 168
SECURITY THROUGH OBSCURITY
P. 168
DEFEATING WEP
P. 173
802.11 AUTHENTICATION TYPES
P. 184
SHARED KEY AUTHENTICATION
P. 184
OPEN AUTHENTICATION
P. 184
802.1X AUTHENTICATION
P. 185
ADVANCED ATTACKS AGAINST WEP
P. 185
RC4 ENCRYPTION PRIMER
P. 185
ROGUE APS
P. 188
HOW WINDOWS LOOKS FOR PREFERRED NETWORKS
P. 189
OTHER KARMA IMPROVEMENTS
P. 190
ATTACKING THE AVAILABILITY OF WIRELESS NETWORKS
P. 194
RTS/CTS ATTACKS
P. 195
MISCELLANEOUS WIRELESS ATTACKS
P. 198
SUMMARY
P. 201
ATTACKING WPA-PROTECTED 802.11 NETWORKS
P. 203
BREAKING WPA/802.11I
P. 204
WPA/802.11I BACKGROUND
P. 204
ATTACKING WPA/802.11I ENTERPRISE AUTHENTICATION
P. 212
EAP-TLS
P. 213
LEAP
P. 214
TUNNELING EAP TECHNIQUES (PEAP/ EAP-TTLS)
P. 216
SUMMARY
P. 224
802.11 DEFENSE
P. 225
DIRECT 802.11 DEFENSES
P. 226
WEP
P. 227
DEPLOYING WPA/WPA2 SECURELY
P. 229
AVOIDING LAYER TWO SECURITY ALTOGETHER
P. 231
IMAGE 4
VPN PROTOCOL OVERVIEW
P. 232
802.11 INTRUSION DETECTION
P. 235
CONFIGURING PEAP AND FREERADIUS
P. 236
CREATING THE CERTIFICATE AUTHORITY
P. 237
CREATING THE RADIUS SERVER S CERTIFICATE
P. 238
CONFIGURING FREERADIUS
P. 240
STARTING UP THE RADIUS SERVER
P. 244
CONFIGURING THE AP
P. 244
CONFIGURING WINDOWS XP CLIENTS
P. 244
CONFIGURING OS X CLIENTS
P. 249
CONFIGURING LINUX FOR PEAP AUTHENTICATION
P. 250
COMMON RADIUS CONFIGURATION PROBLEMS
P. 251
SUMMARY
P. 253
HACKING ADDITIONAL WIRELESS TECHNOLOGIES
CASE STUDY: PRIORAPPROVAL P. 256 HACKING HOTSPOTS P. 261 ENUMERATION P.
263 IDENTIFYING HOTSPOT CLIENTS P. 264 HACKING THE INFRASTRUCTURE P. 267
CLIENT ATTACKS P. 274 ADDITIONAL RESOURCES P. 286 SUMMARY P. 286 THE
POTENTIAL THREAT OF BLUETOOTH P. 287 WHAT IS BLUETOOTH? P. 288 HOW FAR
DOES BLUETOOTH REACH? P. 288 WHAT SORT OF FUNCTIONALITY DOES BLUETOOTH
HAVE? P. 289 PROBLEMS WITH BLUETOOTH SECURITY P. 289 SUMMARY P. 330
ADVANCED ATTACKS P. 333 LAYER 2 FRAGMENTATION P. 334 BREAKING THE
SILENCE P. 336 LAYER 2 AND LAYER 3 RESOLUTION P. 336 IP P. 337 UDP P.
342 TCP P. 342 DEVICE DRIVER VULNERABILITIES P. 353 SUMMARY P. 361 INDEX
P. 363 TABLE OF CONTENTS PROVIDED BY BLACKWELL S BOOK SERVICES AND R.R.
BOWKER. USED WITH PERMISSION.
|
any_adam_object | 1 |
author | Cache, Johnny Liu, Vincent |
author_facet | Cache, Johnny Liu, Vincent |
author_role | aut aut |
author_sort | Cache, Johnny |
author_variant | j c jc v l vl |
building | Verbundindex |
bvnumber | BV036458546 |
ctrlnum | (OCoLC)728165198 (DE-599)GBV522470572 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02094nam a2200457 c 4500</leader><controlfield tag="001">BV036458546</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100602 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100518s2007 ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007035664</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0072262583</subfield><subfield code="9">0-07-226258-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780072262582</subfield><subfield code="9">978-0-07-226258-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)728165198</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV522470572</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cache, Johnny</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking exposed wireless</subfield><subfield code="b">wireless security secrets & solutions</subfield><subfield code="c">Johnny Cache ; Vincent Liu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXV, 387 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless LANs / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Vincent</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0814/2007035664-b.html</subfield><subfield code="y">Contributor biographical information</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0814/2007035664-d.html</subfield><subfield code="y">Publisher description</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0814/2007035664-t.html</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/bowker/toc/9780072262582.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020330484&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020330484</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV036458546 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:39:53Z |
institution | BVB |
isbn | 0072262583 9780072262582 |
language | English |
lccn | 2007035664 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020330484 |
oclc_num | 728165198 |
open_access_boolean | 1 |
owner | DE-634 |
owner_facet | DE-634 |
physical | XXV, 387 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Cache, Johnny Verfasser aut Hacking exposed wireless wireless security secrets & solutions Johnny Cache ; Vincent Liu New York [u.a.] McGraw-Hill 2007 XXV, 387 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Wireless communication systems / Security measures Wireless LANs / Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Liu, Vincent Verfasser aut http://www.loc.gov/catdir/enhancements/fy0814/2007035664-b.html Contributor biographical information kostenfrei http://www.loc.gov/catdir/enhancements/fy0814/2007035664-d.html Publisher description kostenfrei http://www.loc.gov/catdir/enhancements/fy0814/2007035664-t.html kostenfrei Inhaltsverzeichnis DE-601 pdf/application http://www.gbv.de/dms/bowker/toc/9780072262582.pdf Inhaltsverzeichnis GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020330484&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cache, Johnny Liu, Vincent Hacking exposed wireless wireless security secrets & solutions Wireless communication systems / Security measures Wireless LANs / Security measures Datensicherung (DE-588)4011144-1 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4633975-9 |
title | Hacking exposed wireless wireless security secrets & solutions |
title_auth | Hacking exposed wireless wireless security secrets & solutions |
title_exact_search | Hacking exposed wireless wireless security secrets & solutions |
title_full | Hacking exposed wireless wireless security secrets & solutions Johnny Cache ; Vincent Liu |
title_fullStr | Hacking exposed wireless wireless security secrets & solutions Johnny Cache ; Vincent Liu |
title_full_unstemmed | Hacking exposed wireless wireless security secrets & solutions Johnny Cache ; Vincent Liu |
title_short | Hacking exposed wireless |
title_sort | hacking exposed wireless wireless security secrets solutions |
title_sub | wireless security secrets & solutions |
topic | Wireless communication systems / Security measures Wireless LANs / Security measures Datensicherung (DE-588)4011144-1 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
topic_facet | Wireless communication systems / Security measures Wireless LANs / Security measures Datensicherung Drahtloses lokales Netz |
url | http://www.loc.gov/catdir/enhancements/fy0814/2007035664-b.html http://www.loc.gov/catdir/enhancements/fy0814/2007035664-d.html http://www.loc.gov/catdir/enhancements/fy0814/2007035664-t.html http://www.gbv.de/dms/bowker/toc/9780072262582.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020330484&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT cachejohnny hackingexposedwirelesswirelesssecuritysecretssolutions AT liuvincent hackingexposedwirelesswirelesssecuritysecretssolutions |