Table of content


   
  Table of Contents
  Index
  Examples
Maximum Wireless Security
By Cyrus Peikari, Seth Fogie
 
Publisher : Sams Publishing
Pub Date : December 18, 2002
ISBN : 0-672-32488-1
Pages : 408


    Copyright
    About the Authors
      About the Technical Editors
    We Want to Hear from You!
      Reader Services
    Introduction
    Part I:  Wireless Fundamentals
      Chapter 1.  Wireless Hardware
      Access Points
      Linksys WAP11
      NetGear ME102
      Antennas
      Radome-Enclosed Yagi Antenna: HyperLink HG2415Y
      Parabolic Grid Antenna: HyperLink HG2419G
      SigMax Omni-Directional: Signull SMISMCO10
      SigMax Circular Yagi: Signull SMISMCY12
      TechnoLab Log Periodic Yagi
      Wireless NICs
      ORiNOCO PC Card
      Handheld Devices
      Compaq iPAQ
      Summary
      Chapter 2.  Wireless Network Protocols
      Inside the 802.11 Standard
      Inside the 802.11g Standard
      802.11a Versus 802.11b
      Understanding HomeRF
      Understanding IrDA
      Understanding Bluetooth
      Summary
      Chapter 3.  Wireless Programming
      HTML/XML/XHTML
      WAP/WML/WMLScript
      Openwave SDK
      i-mode
      Java
      .NET
      Summary
      Chapter 4.  WEP Security
      WEP Introduction
      RC4 Encryption
      How RC4 Works
      Summary
    Part II:  Wireless Threats
      Chapter 5.  Cracking WEP
      WEP Review
      Data Analysis
      Technical Example
      IV Collision
      Key Extraction
      Summary
      Chapter 6.  Hacking Techniques
      Diverse Hacker Attack Methods
      Sniffing
      Spoofing and Session Hijacking
      Understanding Buffer Overflows
      Unexpected Input
      Denial-of-Service Attacks
      Summary
      Chapter 7.  Wireless Attacks
      Surveillance
      War Driving
      Client-to-Client Hacking
      Rogue Access Points
      Jamming (Denial of Service)
      Practical WEP Cracking
      Summary
      Chapter 8.  Airborne Viruses
      Airborne Viruses
      Virus Overview
      Virus Prevention
      Hostile Web Pages and Scripting
      Palm OS
      Viruses on Windows CE .NET
      Handset Viruses
      Summary
    Part III:  Tools of the Trade
      Chapter 9.  Auditing Tools
      Ethereal
      NetStumbler
      Kismet
      AirSnort
      WEPCrack
      Windows XP
      AiroPeek NX
      Summary
      Chapter 10.  Pocket PC Hacking
      Important URLs
      Pocket PC Installation
      WLAN Drivers
      MiniStumbler
      CENiffer
      Net Force and vxUtil
      IBM Wireless Security Auditor
      Summary
      Chapter 11.  Wireless Hack Walkthrough
      The Test Network
      Defining the Goal
      Investigation and Discovery
      Attack Preparation
      Execution
      Clean Up
      Summary
    Part IV:  Wireless Security
      Chapter 12.  Securing the WLAN
      Access Point-Based Security Measures
      Third-Party Security Methods
      Funk's Steel-Belted Radius
      WLAN Protection Enhancements
      Summary
      Chapter 13.  Virtual Private Networks
      VPN Review
      Tunneling
      IPsec
      L2TP
      Attacks Against VPNs
      Deploying VPNs in WLANs
      Summary
      Chapter 14.  Intrusion Detection Systems
      Log File Monitors
      Integrity Monitors
      IDS Theory
      Receiver Operating Characteristic Curves
      Hacking Through IDSs
      The Future of IDSs
      Summary
      Chapter 15.  Wireless Public Key Infrastructure
      Public Key Cryptography
      Digital Signatures
      Certificate Authorities
      Wireless PKI Implementation
      Transaction Confirmation
      Integrity of User Identities
      Third-Party Services
      WAP PKI
      Summary
    Part V:  Appendixes
      Appendix A.  Decimal/Hex/Binary Conversion Table
      Appendix B.  WEPCrack Exploit Code Example
      GNU General Public License
      Appendix C.  References
    Index


Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net