[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] WAP (Wireless Application Protocol) 2nd 3rd application stack network bearers Wireless Application Environment (WAE) Wireless Datagram Protocol (WDP) Wireless Session Protocol (WSP) Wireless Transaction Session Protocol (WTSP) Wireless Transport Layer Security (WTLS) certificate delivery 2nd certificate enrollment 2nd certificate requests 2nd device certificates 2nd PCS devices browsing 2nd 3rd security tokens 2nd combined SIM/WIM chip 2nd separate dual-slot device with removable WIM chip separate hardware component WIM chip separate SIM/WIM chip 2nd WIM implementation methods 2nd Service and Device Management (SDM) 2nd 3rd SmartTrust Trusted Operator Services (TOS) 2nd 3rd 4th 5th 6th SmartTrust Wireless Internet Browser (WIB) plug-ins 2nd WAP PKI Model CA Public Key Certificates (WTLS Class 2) 2nd 3rd certificate delivery 2nd certificate enrollment 2nd certificate management 2nd 3rd certificate requests 2nd Client Public Key Certificates (WMLScript SignText) 2nd 3rd 4th Client Public Key Certificates (WTLS Class 3) 2nd 3rd device certificates 2nd limitations 2nd security tokens 2nd combined SIM/WIM chip 2nd dual-slot device with removable WIM chip hardware component WIM chip separate SIM/WIM chip 2nd WIM implementation methods 2nd Service and Device Management (SDM) 2nd 3rd SmartTrust software 2nd SmartTrust Wireless Internet Browser (WIB) 2nd Trusted Operator Services (TOS) 2nd 3rd 4th 5th 6th war driving Electronic Communications Privacy Act (ECPA) legality of NetStumbler software 2nd configuring 2nd 3rd ORiNOCO software configuring 2nd 3rd popularity of required hardware 2nd search areas terminology typical person vehicle setups 2nd Web browsers hostile Web pages potential damage 2nd Internet Explorer security settings Web forms malicious hacker exploits 2nd Web pages dynamic vulnerability to attack 2nd 3rd hostile potential damage 2nd scripts programming holes 2nd vulnerability prevention 2nd static 2nd 3rd Web servers DMZ (demilitarized zone) placement 2nd spam attacks open relay configuration SYN flooding process 2nd 3rd Web sites AiroPeek NX AirSnort Compaq Entrust.com wireless PKI implementation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Ethereal Funk.com 2nd GTK.org HyperLink Tech 2nd 3rd 4th Kismet Linksys NetGear NetStumbler NetworkECG ORiNONO Wireless 2nd Perl.com Pocket PC hacking resources 2nd reference resources 2nd Signull 2nd 3rd 4th SmartTrust WAP PKI software 2nd Snort.org 2nd TCPDump.org TechnoLab 2nd Tripwire 2nd WildPackets.com 2nd 3rd Wiretrip.net 2nd WEP (Wired Equivalency Privacy) (Wireless Equivalent Privacy) 128-bit checksumming process crackability of 2nd decryption process 2nd development of 2nd encryption cracking 2nd encryption process hackers bitwise comparisons 2nd 3rd data capture 2nd 3rd 4th IEEE 802.11 standard 2nd IV (Initialization Vector) collisions 2nd 3rd 4th preshared password array values weak formats 2nd key extraction cracking 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th live wireless data transmission example 2nd 3rd original intent of plaintext predetermining 2nd protection levels 2nd RC4 algorithm checksums decryption process Key Scheduling Algorithm 2nd 3rd 4th 5th 6th Key Scheduling Algorithm functions 2nd packet keys 2nd PRG Algorithm 2nd 3rd 4th RC4 encryption 64-bit/128-bit 2nd 3rd implementation of 2nd Initialization Vector (IV) weaknesses Initiation Vector (IV) weaknesses key strength 2nd 3rd security flaws 2nd SNAP headers password bytes 2nd technical example ciphertext creation comparable equation 1 2nd comparable equation 2 keystream retrieval 2nd WEPCrack code exploit example Prisdump Parser (Listing B.2) 2nd 3rd 4th 5th 6th Prism-decode.pl module (Listing B.1) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th RC4 Keyscheduler (Listing B.3) 2nd 3rd 4th 5th 6th 7th 8th WEPCrack development of features 2nd installing output prismdump program 2nd 3rd prism-getIV.pl script 2nd weakIVGen.pl script 2nd WEPCrack.pl script 2nd scripts 2nd supported platforms Web site WEPCrack code exploit example Prisdump Parser (Listing B.2) 2nd 3rd 4th 5th 6th Prism-decode.pl module (Listing B.1) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th RC4 Keyscheduler (Listing B.3) 2nd 3rd 4th 5th 6th 7th 8th WEPCRACK script 2nd Whisker HTTP mutation tool 2nd whois utility (NetForce) whois utility (vxUtil) WIB (Wireless Internet Browser) wildPackets.com Web site WildPackets.com Web site AiroPeek sniffer 2nd WIM (Wireless Identity Module) dual-slot devices WAP security tokens hardware component WAP security tokens implmentation methods (Table ) 2nd Windows 2000 NetStumbler TCP/IP settings, turning off 2nd Windows CE Pocket PC hacking overview 2nd Web site resources 2nd Windows NT NetStumbler TCP/IP settings, turning off 2nd Windows XP auditing advantages NetStumbler database results, viewing 2nd 3rd TCP/IP settings, turning off 2nd 3rd WLAN detector launching 2nd 3rd 4th WNICs installing 2nd winipcfg tool MAC addresses displaying (Windows 95/98/ME) WinPcap utility Ethereal for Windows installing Wired Equivalency Privacy, [See WEP] Wireless Application Environment (WAE) WAP application stack Wireless Application Protocol, [See WAP]2nd [See WAP]3rd [See WAP] wireless attacks access points target proliferation client-to-client hacking 2nd 3rd 4th AiroPeek sniffer 2nd WNICs, PEER mode 2nd 3rd 4th frequency jamming (DoS attacks) 2nd 3rd 4th 5th overview 2nd 3rd proliferation of 2nd 3rd rogue Access Points (APs) 2nd 3rd 4th surveillance reconnaisance 2nd 3rd 4th war driving Electronic Communications Privacy Act (ECPA) legality of NetStumbler software 2nd 3rd 4th 5th OriNOCO software 2nd 3rd popularity of required hardware 2nd search areas terminology typical person vehicle setups 2nd Wireless Datagram Protocol (WDP) WAP application stack Wireless Equivalent Privacy, [See WEP] Wireless Internet Browser (WIB) plug-ins (SmartTrust) 2nd Wireless Markup Language, [See WML]2nd [See WML] Wireless Network Interface Cards, [See WNICs]2nd [See WNICs] wireless network protocols 802.11 standard (IEEE) CSMA/Collision Avoidance 2nd overview 2nd prior techologies 802.11a standard (IEEE) 5GHz range Orthogonal Frequency Division Multiplexing overview versus 802.11b standard 2nd 802.11b standard (IEEE) 2.4 GHz range 2nd DSSS (direct-sequence spread spectrum) versus 802.11a standard 2nd 802.11g standard (IEEE) overview Bluetooth communication process 2nd development of overview piconet security features 2nd techincal specifications HomeRF FHSS standard 2nd overview IrDA overview 2nd 3rd PANs (personal are networks) potential light transmission problems overview 2nd wireless networks access steps attack preparation 2nd clean up stage 2nd defining the goal 2nd execution stage 2nd investigation and discovery 2nd 3rd 4th 5th 6th 7th 8th test network scenario 2nd hackers access overview 2nd 3rd security auditors access overview 2nd 3rd wireless PKI Entrust.com example 2nd factor authentication 2nd digital signatures GetAccess server access 2nd Secure Web Portal solution 2nd third party services 2nd transaction confirmations user identity integrity 2nd SmartTrust Trusted Operator Services (TOS) 2nd 3rd 4th 5th 6th SmartTrust Wireless Internet Browser (WIB) plug-ins 2nd WAP certificate delivery 2nd certificate enrollment 2nd certificate requests 2nd device certificates 2nd Service and Device Management (SDM) 2nd 3rd wireless programming languages .NET 2nd HTML i-mode 2nd Java 2nd overview 2nd WML 2nd 3rd WMLScript 2nd 3rd XHTML 2nd 3rd 4th XML 2nd 3rd wireless protocols WAP application stack 2nd 3rd 4th 5th 6th PCS device browsing 2nd 3rd Wireless Session Protocol (WSP) WAP application stack wireless sniffers AiroPeek 2nd wireless test labs constructing 2nd 3rd testing 2nd 3rd Wireless Transaction Session Protocol (WTSP) WAP application stack Wireless Transport Layer Security (WTLS) WAP application stack Wiretrip.net Web site 2nd wlanclt-ng commands Kismet WLANs access point-based security measures DMZ (demilitarized zone) 2nd MAC-filtering 2nd 3rd 4th 5th 6th 7th 8th 9th radiation zone control 2nd 3rd 4th 5th WEP 2nd AES (Advanced Encryption Standard) 2nd drivers installing (Pocket PC) 2nd firewalls implementing 2nd intrustion detection systems (IDSs) 2nd radiation zone signal bleeding 2nd 3rd 4th 5th RADIUS (Remote Authentication Dial-In User Service) servers Funk Steel-Belted 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th typical configuration SSL (Secure Sockets Layer) 2nd TKIP (Temporal Key Integrity Protocol) 2nd 3rd 4th VPNs deployment of 2nd tunneling 2nd 3rd Windows XP detector 2nd 3rd 4th WML (Wireless Markup Language) 2nd applications Apache server configuration 2nd creating IIS server configuration sample PCS cards 2nd WMLScript PCS client-side scripting 2nd 3rd WMLScript SignText WAP PKI Model Client Public Key Certificates 2nd 3rd 4th WNICs (Wireless Network Interface Cards) 2nd AiroPeek NX support IBM Wireless Security Auditor support ORiNOCO PC Card Gold/Silver models 2nd Windows XP installing 2nd worms holes I Love You estimated damages Morris damage estimates versus viruses WTLS (Wireless Transport Layer Security protocol) 2nd 3rd WAP PKI Model CA Public Key Certificates 2nd 3rd Client Public Key Certificates 2nd 3rd |