| | Copyright |
| | About the Authors |
| | | About the Technical Editors |
|
| | We Want to Hear from You! |
| | | Reader Services |
|
| | Introduction |
| | Part I: Wireless Fundamentals |
| | | Chapter 1. Wireless Hardware |
| | | Access Points |
| | | Linksys WAP11 |
| | | NetGear ME102 |
| | | Antennas |
| | | Radome-Enclosed Yagi Antenna: HyperLink HG2415Y |
| | | Parabolic Grid Antenna: HyperLink HG2419G |
| | | SigMax Omni-Directional: Signull SMISMCO10 |
| | | SigMax Circular Yagi: Signull SMISMCY12 |
| | | TechnoLab Log Periodic Yagi |
| | | Wireless NICs |
| | | ORiNOCO PC Card |
| | | Handheld Devices |
| | | Compaq iPAQ |
| | | Summary |
|
| | | Chapter 2. Wireless Network Protocols |
| | | Inside the 802.11 Standard |
| | | Inside the 802.11g Standard |
| | | 802.11a Versus 802.11b |
| | | Understanding HomeRF |
| | | Understanding IrDA |
| | | Understanding Bluetooth |
| | | Summary |
|
| | | Chapter 3. Wireless Programming |
| | | HTML/XML/XHTML |
| | | WAP/WML/WMLScript |
| | | Openwave SDK |
| | | i-mode |
| | | Java |
| | | .NET |
| | | Summary |
|
| | | Chapter 4. WEP Security |
| | | WEP Introduction |
| | | RC4 Encryption |
| | | How RC4 Works |
| | | Summary |
|
|
| | Part II: Wireless Threats |
| | | Chapter 5. Cracking WEP |
| | | WEP Review |
| | | Data Analysis |
| | | Technical Example |
| | | IV Collision |
| | | Key Extraction |
| | | Summary |
|
| | | Chapter 6. Hacking Techniques |
| | | Diverse Hacker Attack Methods |
| | | Sniffing |
| | | Spoofing and Session Hijacking |
| | | Understanding Buffer Overflows |
| | | Unexpected Input |
| | | Denial-of-Service Attacks |
| | | Summary |
|
| | | Chapter 7. Wireless Attacks |
| | | Surveillance |
| | | War Driving |
| | | Client-to-Client Hacking |
| | | Rogue Access Points |
| | | Jamming (Denial of Service) |
| | | Practical WEP Cracking |
| | | Summary |
|
| | | Chapter 8. Airborne Viruses |
| | | Airborne Viruses |
| | | Virus Overview |
| | | Virus Prevention |
| | | Hostile Web Pages and Scripting |
| | | Palm OS |
| | | Viruses on Windows CE .NET |
| | | Handset Viruses |
| | | Summary |
|
|
| | Part III: Tools of the Trade |
| | | Chapter 9. Auditing Tools |
| | | Ethereal |
| | | NetStumbler |
| | | Kismet |
| | | AirSnort |
| | | WEPCrack |
| | | Windows XP |
| | | AiroPeek NX |
| | | Summary |
|
| | | Chapter 10. Pocket PC Hacking |
| | | Important URLs |
| | | Pocket PC Installation |
| | | WLAN Drivers |
| | | MiniStumbler |
| | | CENiffer |
| | | Net Force and vxUtil |
| | | IBM Wireless Security Auditor |
| | | Summary |
|
| | | Chapter 11. Wireless Hack Walkthrough |
| | | The Test Network |
| | | Defining the Goal |
| | | Investigation and Discovery |
| | | Attack Preparation |
| | | Execution |
| | | Clean Up |
| | | Summary |
|
|
| | Part IV: Wireless Security |
| | | Chapter 12. Securing the WLAN |
| | | Access Point-Based Security Measures |
| | | Third-Party Security Methods |
| | | Funk's Steel-Belted Radius |
| | | WLAN Protection Enhancements |
| | | Summary |
|
| | | Chapter 13. Virtual Private Networks |
| | | VPN Review |
| | | Tunneling |
| | | IPsec |
| | | L2TP |
| | | Attacks Against VPNs |
| | | Deploying VPNs in WLANs |
| | | Summary |
|
| | | Chapter 14. Intrusion Detection Systems |
| | | Log File Monitors |
| | | Integrity Monitors |
| | | IDS Theory |
| | | Receiver Operating Characteristic Curves |
| | | Hacking Through IDSs |
| | | The Future of IDSs |
| | | Summary |
|
| | | Chapter 15. Wireless Public Key Infrastructure |
| | | Public Key Cryptography |
| | | Digital Signatures |
| | | Certificate Authorities |
| | | Wireless PKI Implementation |
| | | Transaction Confirmation |
| | | Integrity of User Identities |
| | | Third-Party Services |
| | | WAP PKI |
| | | Summary |
|
|
| | Part V: Appendixes |
| | | Appendix A. Decimal/Hex/Binary Conversion Table |
| | | Appendix B. WEPCrack Exploit Code Example |
| | | GNU General Public License |
|
| | | Appendix C. References |
|
| | Index |