| | | Copyright |
| | | Praise for Real 802.11 Security: Wi-Fi Protected Access and 802.11i |
| | | Preface |
| | | | Why This Book Now? |
| | | | Audience |
| | | | Organization |
| | | | Disclaimer |
|
| | | Acknowledgments |
| | | Part I. What Everyone Should Know |
| | | | Chapter 1. Introduction |
| | | | Setting the Scene |
| | | | Roadmap to the Book |
| | | | Notes on the Book |
|
| | | | Chapter 2. Security Principles |
| | | | What Is Security? |
| | | | Good Security Thinking |
| | | | Security Terms |
| | | | Summary |
|
| | | | Chapter 3. Why Is Wi-Fi Vulnerable to Attack? |
| | | | Changing the Security Model |
| | | | What Are the Enemies Like? |
| | | | Traditional Security Architecture |
| | | | Danger of Passive Monitoring |
| | | | Summary |
|
| | | | Chapter 4. Different Types of Attack |
| | | | Classification of Attacks |
| | | | Attacks Without Keys |
| | | | Attacks on the Keys |
| | | | Summary |
|
|
| | | Part II. The Design of Wi-Fi Security |
| | | | Chapter 5. IEEE 802.11 Protocol Primer |
| | | | Layers |
| | | | Wireless LAN Organization |
| | | | Basics of Operation in Infrastructure Mode |
| | | | Protocol Details |
| | | | Radio Bits |
| | | | Summary |
|
| | | | Chapter 6. How IEEE 802.11 WEP Works and Why It Doesn't |
| | | | Introduction |
| | | | Authentication |
| | | | Privacy |
| | | | Mechanics of WEP |
| | | | Why WEP Is Not Secure |
| | | | Summary |
|
| | | | Chapter 7. WPA, RSN, and IEEE 802.11i |
| | | | Relationship Between Wi-Fi and IEEE 802.11 |
| | | | What Is IEEE 802.11i? |
| | | | What Is WPA? |
| | | | Differences Between RSN and WPA |
| | | | Security Context |
| | | | Keys |
| | | | Security Layers |
| | | | Relationship of the Standards |
| | | | Summary |
|
| | | | Chapter 8. Access Control: IEEE 802.1X, EAP, and RADIUS |
| | | | Importance of Access Control |
| | | | Authentication for Dial-in Users |
| | | | IEEE 802.1X |
| | | | EAP Principles |
| | | | EAPOL |
| | | | Messages Used in IEEE 802.1X |
| | | | Implementation Considerations |
| | | | RADIUS Remote Access Dial-In User Service |
| | | | Summary |
|
| | | | Chapter 9. Upper-Layer Authentication |
| | | | Introduction |
| | | | Who Decides Which Authentication Method to Use? |
| | | | Use of Keys in Upper-Layer Authentication |
| | | | A Detailed Look at Upper-Level Authentication Methods |
| | | | Transport Layer Security (TLS) |
| | | | Kerberos |
| | | | Cisco Light EAP (LEAP) |
| | | | Protected EAP Protocol (PEAP) |
| | | | Authentication in the Cellular Phone World: EAP-SIM |
| | | | Summary |
|
| | | | Chapter 10. WPA and RSN Key Hierarchy |
| | | | Pairwise and Group Keys |
| | | | Pairwise Key Hierarchy |
| | | | Group Key Hierarchy |
| | | | Key Hierarchy Using AES CCMP |
| | | | Mixed Environments |
| | | | Summary of Key Hierarchies |
| | | | Details of Key Derivation for WPA |
| | | | Nonce Selection |
| | | | Computing the Temporal Keys |
| | | | Summary |
|
| | | | Chapter 11. TKIP |
| | | | What Is TKIP and Why Was It Created? |
| | | | TKIP Overview |
| | | | Per-Packet Key Mixing |
| | | | TKIP Implementation Details |
| | | | Message Integrity Michael |
| | | | Per-Packet Key Mixing |
| | | | Summary |
|
| | | | Chapter 12. AES CCMP |
| | | | Introduction |
| | | | Why AES? |
| | | | AES Overview |
| | | | How CCMP Is Used in RSN |
| | | | Summary |
|
| | | | Chapter 13. Wi-Fi LAN Coordination: ESS and IBSS |
| | | | Network Coordination |
| | | | WPA/RSN Information Element |
| | | | Preauthentication Using IEEE 802.1X |
| | | | IBSS Ad-Hoc Networks |
| | | | Summary |
|
|
| | | Part III. Wi-Fi Security in the Real World |
| | | | Chapter 14. Public Wireless Hotspots |
| | | | Development of Hotspots |
| | | | Security Issues in Public Hotspots |
| | | | How Hotspots Are Organized |
| | | | Different Types of Hotspots |
| | | | How to Protect Yourself When Using a Hotspot |
| | | | Summary |
|
| | | | Chapter 15. Known Attacks: Technical Review |
| | | | Review of Basic Security Mechanisms |
| | | | Review of Previous IEEE 802.11 Security Mechanisms |
| | | | Attacks Against the Previous IEEE 802.11 Security Mechanisms |
| | | | Man-in-the-Middle Attacks |
| | | | Problems Created by Man-in-the-Middle Attacks |
| | | | Denial-of-Service Attacks |
| | | | Summary |
|
| | | | Chapter 16. Actual Attack Tools |
| | | | Attacker Goals |
| | | | Process |
| | | | Example Scenarios |
| | | | Other Tools of Interest |
| | | | Summary |
|
| | | | Chapter 17. Open Source Implementation Example |
| | | | General Architecture Design Guidelines |
| | | | Protecting a Deployed Network |
| | | | Planning to Deploy a WPA Network |
| | | | Deploying the Infrastructure |
| | | | Practical Example Based on Open Source Projects |
| | | | Summary |
| | | | Acknowledgments |
| | | | References and More Information |
|
|
| | | Appendixes |
| | | | Appendix A. Overview of the AES Block Cipher |
| | | | Finite Field Arithmetic |
| | | | Steps in the AES Encryption Process |
|
| | | | Appendix B. Example Message Modification |
| | | | Example Message Modification |
|
| | | | Appendix C. Verifying the Integrity of Downloaded Files |
| | | | Checking the MD5 Digest |
| | | | Checking the GPG Signature |
|
|
| | | Acronyms |
| | | References |