[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] CA Public Key Certificates (WTLS Class 2) 2nd 3rd capturing data CENiffer Carnivore (FBI sniifer) Carrier Sense Multiple Access/Collision Detection, [See CSMA/CD]2nd [See CSMA/CD] cell phones Internet-enabled airborne viruses 2nd CENiffer access points (APs) searching 2nd 3rd 4th 5th data capturing filters 2nd 3rd installing launching 2nd certificate authorities (CAs) certificate chain trust issues trusted root certificate VeriSign vulnerability examples 2nd 3rd X.509 standard format components 2nd revocation of certificates certificate revocation list (RCL) X.509 standard certificates delivery (WAP PKI) 2nd devices (WAP PKI) 2nd enrollment (WAP PKI) 2nd managing (WAP PKI Model) 2nd 3rd requests (WAP PKI) 2nd chat rooms hacker targeting of newbies 2nd checksums RC4 algorithm WEP security checksums (CRCs) data integrity verification 2nd cHTML i-mode technology 2nd ciphers RC4 encryption block 2nd self-synchronizing stream 2nd stream 2nd ciphertext creating (WEP) keystream deductions (WEP) 2nd 3rd Cisco L2F protocol (VPNs) client attacks (VPNs) 2nd Client Public Key Certificates (WMLScript SignText) 2nd 3rd 4th Client Public Key Certificates (WTLS Class 3) 2nd 3rd client-to-client hacking association relationships 2nd 3rd 4th wireless sniffers AiroPeek 2nd WNICs PEER mode 2nd 3rd 4th collisions (IV) WEP 2nd 3rd 4th Compaq iPAQ CENiffer access point searches 2nd 3rd 4th 5th data capturing filters 2nd 3rd installing launching 2nd features 2nd IBM Security Auditor application window configuration screen features 2nd GPS support Help menu launching root background window supported WNICs MiniStumbler access point searches 2nd installing launching 2nd Net Force installing 2nd 3rd 4th launching Pocket PC hacking overview 2nd programs installing 2nd technical specifications vxUtil installing 2nd 3rd 4th launching WLAN drivers installing 2nd Compaq Web site concatenating packets keys IV (WEP Initialization Vector) configuring Apache Server WML applications 2nd Ethereal 2nd 3rd Internet Information Server (IIS) WML applications NetStumbler software (war driver) 2nd 3rd ORiNOCO software (war driver) 2nd 3rd crackers AirSnort features 2nd 3rd installing 2nd ORiNOCO card 2nd 3rd 4th 5th 6th version 1 2nd 3rd version 2+ 2nd 3rd WEPCrack development of features 2nd installing output prismdump program 2nd 3rd 4th 5th 6th 7th 8th 9th scripts 2nd supported platforms Web site cracking WEP key extraction 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th WEP encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd CRCs (Cyclic Redundancy Checks) 2nd checksums data integrity verification 2nd cryptology encryption/decryption asymmetrical 2nd symmetrical 2nd CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) 2nd CSMA/CD (Carrier Sense Multiple Access/Collision Detection standard (IEEE 802.3) 2nd Cyclic Redundancy Checks, [See CRCs]2nd [See CRCs] |