Hacking exposed wireless: wireless security secrets & solutions
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
McGraw-Hill
2010
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXV, 484 S. Ill. 24 cm |
ISBN: | 9780071666619 0071666613 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV037191726 | ||
003 | DE-604 | ||
005 | 20110214 | ||
007 | t | ||
008 | 110128s2010 a||| |||| 00||| eng d | ||
015 | |a GBB069693 |2 dnb | ||
020 | |a 9780071666619 |c (alk. paper) |9 978-0-07-166661-9 | ||
020 | |a 0071666613 |c (alk. paper) |9 0-07-166661-3 | ||
035 | |a (OCoLC)640078077 | ||
035 | |a (DE-599)BVBBV037191726 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-634 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Cache, Johnny |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking exposed wireless |b wireless security secrets & solutions |c Johnny Cache ; Joshua Wright ; Vincent Liu |
250 | |a 2. ed. | ||
264 | 1 | |a New York [u.a.] |b McGraw-Hill |c 2010 | |
300 | |a XXV, 484 S. |b Ill. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Wireless communication systems / Security measures | |
650 | 4 | |a Wireless LANs / Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Wright, Joshua D. |e Sonstige |0 (DE-588)142443263 |4 oth | |
700 | 1 | |a Liu, Vincent |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021106164&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-021106164 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804143778062139392 |
---|---|
adam_text | Titel: Hacking exposed wireless
Autor: Cache, Johnny
Jahr: 2010
CONTENTS
Foreword ........................................................ xvii
Acknowledgments ................................................ xix
Introduction ...................................................... xxi
Hacking 802.11 Wireless Technology
Case Study: Wireless Hacking for Hire............................... 2
Her First Engagement ....................................... 2
A Parking Lot Approach ..................................... 2
The Robot Invasion ......................................... 3
Final Wrap-Up .............................................. 4
1 Introduction to 802.11 Hacking ........................................... 7
802.11 in a Nutshell ............................................... 8
The Basics ................................................. 8
Addressing in 802.11 Packets ................................. 9
802.11 Security Primer ....................................... 9
Discovery Basics .................................................. 13
Hardware and Drivers ............................................. 21
A Note on the Linux Kernel .................................. 21
Chipsets and Linux Drivers .................................. 22
Modern Chipsets and Drivers ................................ 24
Cards..................................................... 26
Antennas .................................................. 33
Cellular Data Cards......................................... 37
GPS ....................................................... 38
Summary........................................................ 40
2 Scanning and Enumerating 802.11 Networks ............................... 41
Choosing an Operating System ..................................... 42
Windows .................................................. 42
XÌ
x Hacking Exposed Wireless: Wireless Security Secrets Solutions
OSX ...................................................... 42
Linux ...................................................... 43
Windows Discovery Tools .......................................... 43
Vistumbler ................................................. 44
inSSIDer ................................................... 48
Windows Sniffing/Injection Tools ................................... 50
NDIS 6.0 Monitor Mode Support (NetMon) .................... 50
AirPcap ................................................... 54
CommView for WiFi ........................................ 56
OS X Discovery Tools .............................................. 61
KisMAC ................................................... 61
Kismet on OS X ............................................. 67
Linux Discovery Tools ............................................. 67
Kismet .................................................... 67
Mobile Discovery Tools ............................................ 73
Online Mapping Services (WIGLE and Skyhook) ...................... 75
Summary ........................................................ 77
3 Attacking 802.11 Wireless Networks ...................................... 79
Basic Types of Attacks............................................. 80
Security Through Obscurity ........................................ 80
Defeating WEP ................................................... 88
WEP Key Recovery Attacks .................................. 88
Bringing It All Together: Cracking a Hidden Mac-Filtering,
WEP-Encrypted Network ........................................ 104
Keystream Recovery Attacks Against WEP ........................... 107
Attacking the Availability of Wireless Networks ....................... Ill
Summary ........................................................ 113
4 Attacking WPA-Protected 802.11 Networks ................................. 115
Breaking Authentication: WPA-PSK ................................. 116
Breaking Authentication: WPA Enterprise ............................ 129
Obtaining the EAP Handshake............................... 129
LEAP ...................................................... 131
PEAPandEAP-TTLS ........................................ 133
EAP-TLS................................................... 136
EAP-FAST ................................................. 137
EAP-MD5 .................................................. 139
Breaking Encryption: TKIP ......................................... 141
Attacking Components ............................................ 146
Summary ........................................................ 151
Contenti x
Hacking 802.11 Clients
Case Study: Riding the Insecure Airwaves ............................ 154
5 Attack 802.11 Wireless Clients ........................................... 155
Attacking the Application Layer .................................... 157
Attacking Clients Using an Evil DNS Server .......................... 161
Ettercap Support for Content Modification ........................... 165
Dynamically Generating Rogue APs and Evil Servers with Karmetasploit 167
Direct Client Injection Techniques ................................... 172
Injecting Data Packets with AirPWN .......................... 172
Generic Client-side Injection with airtun-ng .................... 175
Munging Software Updates with IPPON ....................... 177
Device Driver Vulnerabilities ....................................... 182
Fingerprinting Device Drivers ................................ 186
Web Hacking and Wi-Fi ............................................ 187
Hacking DNS via XSRF Attacks Against Routers ................ 197
Summary ........................................................ 201
6 Taking It All The Way: Bridging the Airgap from OS X ......................... 203
The Game Plan ................................................... 204
Preparing the Exploit ........................................ 204
Prepping the Callback ....................................... 209
Performing Initial Reconnaissance ............................ 210
Preparing Kismet, Aircrack-ng ................................ 211
Prepping the Package ....................................... 213
Exploiting WordPress to Deliver the Java Exploit ................ 214
Making the Most of User-level Code Execution ....................... 217
Gathering 802.11 Intel (User-level Access) ...................... 219
Popping Root by Brute-forcing the Keychain ................... 220
Returning Victorious to the Machine ........................... 226
Managing OS X s Firewall .................................... 229
Summary ........................................................ 238
7 Taking It All the Way: Bridging the Airgap from Windows ....................... 239
The Attack Scenario ............................................... 240
Preparing for the Attack ........................................... 241
Exploiting Hotspot Environments ............................. 243
Controlling the Client ....................................... 247
Local Wireless Reconnaissance ...................................... 248
Remote Wireless Reconnaissance .................................... 255
Windows Monitor Mode ..................................... 256
Microsoft NetMon .......................................... 257
Target Wireless Network Attack..................................... 263
Summary ........................................................ 267
x v Hacking Exposed Wireless: Wireless Security Secrets Solutions
Case Study: Snow Day ............................................. 270
? 8 Bluetooth Scanning and Reconnaissance .................................. 273
Bluetooth Technical Overview ...................................... 274
Device Discovery ........................................... 275
Protocol Overview .......................................... 275
Bluetooth Profiles ........................................... 278
Encryption and Authentication ............................... 278
Preparing for an Attack ............................................ 279
Selecting a Bluetooth Attack Device ........................... 279
Reconnaissance ................................................... 282
Active Device Discovery ..................................... 282
Passive Device Discovery •.................................... 290
Hybrid Discovery ........................................... 293
Passive Traffic Analysis ...................................... 296
Service Enumeration .............................................. 309
Summary ........................................................ 313
T 9 Bluetooth Eavesdropping ............................................... 315
Commercial Bluetooth Sniffing ..................................... 316
Open-Source Bluetooth Sniffing ..................................... 326
Summary •........................................................ 343
? 10 Attacking and Exploiting Bluetooth ........................................ 345
PIN Attacks ...................................................... 346
Practical PIN Cracking ....................................... 352
Identity Manipulation ............................................. 360
Bluetooth Service and Device Class ............................ 360
Bluetooth Device Name ......... ............................. 364
Abusing Bluetooth Profiles ......................................... 374
Testing Connection Access ................................... 375
Unauthorized AT Access ..................................... 377
Unauthorized PAN Access ................................... 381
Headset Profile Attacks ...................................... 385
File ¿Transfer Attacks ......................................... 391
Future Outlook ................................................... 396
Summary ........................................................ 398
T 11 HackZigBee ,......................................................... 399
,ZigBee Introduction ............................................... 400
ZigBee s Place as a Wireless Standard .......................... 400
ZigBee Deployments ........................................ 401
ZigBee History and Evolution ................................ 402
Contents xv
ZigBee Layers .............................................. 402
ZigBee Profiles ............................................. 406
ZigBee Security ................................................... 407
Rules in the Design of ZigBee Security ......................... 407
ZigBee Encryption .......................................... 408
ZigBee Authenticity ......................................... 409
ZigBee Authentication ....................................... 409
ZigBee Attacks ................................................... 410
Introduction to KillerBee ..................................... 411
Network Discovery ......................................... 416
Eavesdropping Attacks ...................................... 418
Replay Attacks ............................................. 424
Encryption Attacks .......................................... 427
Attack Walkthrough ............................................... 430
Network Discovery and Location ............................. 430
Analyzing the ZigBee Hardware .............................. 432
RAM Data Analysis ......................................... 436
Summary ........................................................ 438
T 12 Hack DECT .......................................................... 439
DECT Introduction ................................................ 440
DECT Profiles .............................................. 441
DECTPHYLayer ........................................... 441
DECT MAC Layer .......................................... 443
Base Station Selection ........................................ 444
DECT Security .................................................... 444
Authentication and Pairing ................................... 445
Encryption Services ......................................... 446
DECT Attacks .................................................... 447
DECTHardware ............................................ 448
DECT Eavesdropping ....................................... 449
DECT Audio Recording ...................................... 455
Summary ........................................................ 458
T A Scoping and Information Gathering ....................................... 459
Pre-assessment ................................................... 460
Scoping .................................................... 460
Things to Bring to a Wireless Assessment ...................... 462
Conducting Scoping Interviews ............................... 464
Gathering Information via Satellite Imagery .................... 465
Putting It All Together ............................................. 469
T Index ............................................................... 471
|
any_adam_object | 1 |
author | Cache, Johnny |
author_GND | (DE-588)142443263 |
author_facet | Cache, Johnny |
author_role | aut |
author_sort | Cache, Johnny |
author_variant | j c jc |
building | Verbundindex |
bvnumber | BV037191726 |
ctrlnum | (OCoLC)640078077 (DE-599)BVBBV037191726 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01824nam a2200445 c 4500</leader><controlfield tag="001">BV037191726</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110214 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110128s2010 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB069693</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071666619</subfield><subfield code="c">(alk. paper)</subfield><subfield code="9">978-0-07-166661-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071666613</subfield><subfield code="c">(alk. paper)</subfield><subfield code="9">0-07-166661-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)640078077</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV037191726</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cache, Johnny</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking exposed wireless</subfield><subfield code="b">wireless security secrets & solutions</subfield><subfield code="c">Johnny Cache ; Joshua Wright ; Vincent Liu</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXV, 484 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wright, Joshua D.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)142443263</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Vincent</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021106164&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021106164</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV037191726 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:53:04Z |
institution | BVB |
isbn | 9780071666619 0071666613 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-021106164 |
oclc_num | 640078077 |
open_access_boolean | |
owner | DE-634 |
owner_facet | DE-634 |
physical | XXV, 484 S. Ill. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Cache, Johnny Verfasser aut Hacking exposed wireless wireless security secrets & solutions Johnny Cache ; Joshua Wright ; Vincent Liu 2. ed. New York [u.a.] McGraw-Hill 2010 XXV, 484 S. Ill. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Wireless communication systems / Security measures Wireless LANs / Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Wright, Joshua D. Sonstige (DE-588)142443263 oth Liu, Vincent Sonstige oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021106164&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cache, Johnny Hacking exposed wireless wireless security secrets & solutions Wireless communication systems / Security measures Wireless LANs / Security measures Datensicherung (DE-588)4011144-1 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4633975-9 |
title | Hacking exposed wireless wireless security secrets & solutions |
title_auth | Hacking exposed wireless wireless security secrets & solutions |
title_exact_search | Hacking exposed wireless wireless security secrets & solutions |
title_full | Hacking exposed wireless wireless security secrets & solutions Johnny Cache ; Joshua Wright ; Vincent Liu |
title_fullStr | Hacking exposed wireless wireless security secrets & solutions Johnny Cache ; Joshua Wright ; Vincent Liu |
title_full_unstemmed | Hacking exposed wireless wireless security secrets & solutions Johnny Cache ; Joshua Wright ; Vincent Liu |
title_short | Hacking exposed wireless |
title_sort | hacking exposed wireless wireless security secrets solutions |
title_sub | wireless security secrets & solutions |
topic | Wireless communication systems / Security measures Wireless LANs / Security measures Datensicherung (DE-588)4011144-1 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
topic_facet | Wireless communication systems / Security measures Wireless LANs / Security measures Datensicherung Drahtloses lokales Netz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021106164&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT cachejohnny hackingexposedwirelesswirelesssecuritysecretssolutions AT wrightjoshuad hackingexposedwirelesswirelesssecuritysecretssolutions AT liuvincent hackingexposedwirelesswirelesssecuritysecretssolutions |