List of Figures


Chapter 1: A Brief Overview of Wi-Fi

Figure 1-1: A hybrid wireless and Ethernet network
Figure 1-2: A wired Ethernet LAN
Figure 1-3: Wi-Fi and Ethernet speed comparison
Figure 1-4: A WLAN with an access point and adapters
Figure 1-5: Ad hoc mode
Figure 1-6: Different access point modes of operation
Figure 1-7: Types of wireless adapters
Figure 1-8: A Bluetooth piconet
Figure 1-9: A Bluetooth scatternet

Chapter 2: Network Fundamentals and Security Concerns

Figure 2-1: Interconnected networks
Figure 2-2: The OSI reference model
Figure 2-3: The TCP/IP reference model
Figure 2-4: The WLAN Layers
Figure 2-5: Packet switching versus circuit switching
Figure 2-6: Encapsulation within headers
Figure 2-7: Subnets
Figure 2-8: Subnet mask
Figure 2-9: DHCP services
Figure 2-10: A fully qualified domain name including the host
Figure 2-11: Wireless bridging using WDS
Figure 2-12: Network address translation

Chapter 3: The People Behind the Problem

Figure 3-1: The defaced Library of Congress Web site
Figure 3-2: Trashing

Chapter 4: Hijacking Wi-Fi

Figure 4-1: Authenticating with an access point
Figure 4-2: Sniffing network traffic
Figure 4-3: Session hijacking
Figure 4-4: Spoofing a MAC address and exploiting a race condition
Figure 4-5: A VPN
Figure 4-6: A VPN doesn’t secure Web browsing
Figure 4-7: An HTTP proxy server
Figure 4-8: Man-in-the-middle attack
Figure 4-9: A rogue access point
Figure 4-10: A denial of service attack
Figure 4-11: DoS attack against an access point as part of a spoof attack
Figure 4-12: Strong signal jamming
Figure 4-13: FakeAP flood attack

Chapter 5: More Wireless Attacks

Figure 5-1: Protecting a network from Internet attacks with a firewall
Figure 5-2: The User Accounts control panel
Figure 5-3: The Run dialog box
Figure 5-4: The command window
Figure 5-5: Configuring the Norton Antivirus live update feature
Figure 5-6: You can use devices like the Chrysalis WiFi Seeker to sniff out WLANs.
Figure 5-7: Roaming for targets

Chapter 6: Wardriving

Figure 6-1: Wardriving
Figure 6-2: NetStumbler detecting wireless networks
Figure 6-3: Connecting to an access point via a Web browser
Figure 6-4: Hobo symbols
Figure 6-5: Warchalking symbols

Chapter 7: Viruses and Wi-Fi

Figure 7-1: Possible vectors for infecting a WLAN
Figure 7-2: Cross-contamination between WLANs
Figure 7-3: A PDA as a vector for infection
Figure 7-4: A computer virus infecting executable programs
Figure 7-5: The life cycle of a computer virus
Figure 7-6: A document with its extension hidden
Figure 7-7: A double extension can be hidden by a long file name with blank spaces
Figure 7-8: A Trojan program
Figure 7-9: Computer worm infection cycle
Figure 7-10: Worms spread via alternate methods
Figure 7-11: Bot software

Chapter 8: Technical Pitfalls and Solutions

Figure 8-1: Multipath signal propagation
Figure 8-2: Multipath waveforms combining
Figure 8-3: Example of a ghost image
Figure 8.4: Objects causing multipath propagation in the QWLAN environment
Figure 8-5: A diversity antenna system
Figure 8-6: Wi-Fi channels
Figure 8-7: The Windows version of the NMAP port scanner
Figure 8-8: Sources of Wi-Fi interference
Figure 8-9: Consider making a floor plan for network planning
Figure 8-10: Wavelength
Figure 8-11: Wave cycle and frequency
Figure 8-12: Proper mounting of an antenna
Figure 8-13: Multipath interference created by improper mounting
Figure 8-14: Grounding an antenna
Figure 8-15: Manually discharging static
Figure 8-16: The Fresnel zone
Figure 8-17: The Fresnel zone must remain free of obstructions.
Figure 8-18: Interference from trees

Chapter 9: Wireless Privacy Concerns

Figure 9-1: Triangulating a wireless customer’s position
Figure 9-2: Location-based ad delivery
Figure 9-3: The Internet Options dialog box
Figure 9-4: The Internet Options Privacy tab
Figure 9-5: The Per Site Privacy Actions dialog box
Figure 9-6: Automating your home with X10 devices
Figure 9-7: Setting an X10 device’s code
Figure 9-8: Intercepting an X10 video signal
Figure 9-9: Intercepting a Wi-Fi video signal

Chapter 10: Encryption and Wi-Fi

Figure 10-1: Internet Explorer displays a padlock icon in the lower menu bar to indicate a secure connection.
Figure 10-2: Encrypting and decrypting data with an encryption key
Figure 10-3: A simple substitution table
Figure 10-4: The Spartan scytale
Figure 10-5: Using a public key system to encrypt and decrypt a message
Figure 10-6: Key distribution with public key cryptography
Figure 10-7: One method of using a digital signature
Figure 10-8: A one-way-hash of a message
Figure 10-9: A digital certificate warning
Figure 10-10: WPA DoS attack
Figure 10-11: Using PGP to encrypt a message

Chapter 11: Securing Your WLAN

Figure 11-1: Discovering an SSID with NetStumbler
Figure 11-2: Changing the default SSID
Figure 11-3: Changing the default administrative username
Figure 11-4: Connecting to an access point via a Web browser
Figure 11-5: Changing network settings on an access point
Figure 11-6: Disabling DHCP
Figure 11-7: Using configuration software to assign a static IP address
Figure 11-8: The Wireless Network Connection Properties dialog box
Figure 11-9: The Internet Protocol (TCP/IP) Properties dialog box
Figure 11-10: MAC and IP address filtering
Figure 11-11: Spoofing a MAC address to get past MAC filtering
Figure 11-12: Implementing MAC filtering through a Web interface
Figure 11-13: The Run dialog box
Figure 11-14: The command window displaying IP and MAC addresses
Figure 11-15: Configuring IP address filtering
Figure 11-16: The command window displaying a wireless adapter’s IP address
Figure 11-17: An inline attenuator
Figure 11-18: Wi-Fi adapter utility in site-survey mode
Figure 11-19: A hybrid network composed of Ethernet and Wi-Fi segments
Figure 11-20: The Network Connections window
Figure 11-21: The Properties dialog box showing the Advanced tab
Figure 11-22: The Advanced Settings dialog box
Figure 11-23: A WLAN setup in a DMZ
Figure 11-24: The System Properties window

Chapter 12: Protecting Your Wi-Fi Data

Figure 12-1: Online backups
Figure 12-2: RAID controller
Figure 12-3: Nearline storage
Figure 12-4: Drive Image is a powerful backup solution for home and small-office users with a simple user-friendly interface.
Figure 12-5: Ghost’s simple interface will get you underway quickly.
Figure 12-6: A lightning arrestor helps prevent damage due to lightning-induced surges or static electricity.




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net