| | Copyright |
| | Praise for Real 802.11 Security: Wi-Fi Protected Access and 802.11i |
| | Preface |
| | | Why This Book Now? |
| | | Audience |
| | | Organization |
| | | Disclaimer |
|
| | Acknowledgments |
| | Part I. What Everyone Should Know |
| | | Chapter 1. Introduction |
| | | Setting the Scene |
| | | Roadmap to the Book |
| | | Notes on the Book |
|
| | | Chapter 2. Security Principles |
| | | What Is Security? |
| | | Good Security Thinking |
| | | Security Terms |
| | | Summary |
|
| | | Chapter 3. Why Is Wi-Fi Vulnerable to Attack? |
| | | Changing the Security Model |
| | | What Are the Enemies Like? |
| | | Traditional Security Architecture |
| | | Danger of Passive Monitoring |
| | | Summary |
|
| | | Chapter 4. Different Types of Attack |
| | | Classification of Attacks |
| | | Attacks Without Keys |
| | | Attacks on the Keys |
| | | Summary |
|
|
| | Part II. The Design of Wi-Fi Security |
| | | Chapter 5. IEEE 802.11 Protocol Primer |
| | | Layers |
| | | Wireless LAN Organization |
| | | Basics of Operation in Infrastructure Mode |
| | | Protocol Details |
| | | Radio Bits |
| | | Summary |
|
| | | Chapter 6. How IEEE 802.11 WEP Works and Why It Doesn't |
| | | Introduction |
| | | Authentication |
| | | Privacy |
| | | Mechanics of WEP |
| | | Why WEP Is Not Secure |
| | | Summary |
|
| | | Chapter 7. WPA, RSN, and IEEE 802.11i |
| | | Relationship Between Wi-Fi and IEEE 802.11 |
| | | What Is IEEE 802.11i? |
| | | What Is WPA? |
| | | Differences Between RSN and WPA |
| | | Security Context |
| | | Keys |
| | | Security Layers |
| | | Relationship of the Standards |
| | | Summary |
|
| | | Chapter 8. Access Control: IEEE 802.1X, EAP, and RADIUS |
| | | Importance of Access Control |
| | | Authentication for Dial-in Users |
| | | IEEE 802.1X |
| | | EAP Principles |
| | | EAPOL |
| | | Messages Used in IEEE 802.1X |
| | | Implementation Considerations |
| | | RADIUS Remote Access Dial-In User Service |
| | | Summary |
|
| | | Chapter 9. Upper-Layer Authentication |
| | | Introduction |
| | | Who Decides Which Authentication Method to Use? |
| | | Use of Keys in Upper-Layer Authentication |
| | | A Detailed Look at Upper-Level Authentication Methods |
| | | Transport Layer Security (TLS) |
| | | Kerberos |
| | | Cisco Light EAP (LEAP) |
| | | Protected EAP Protocol (PEAP) |
| | | Authentication in the Cellular Phone World: EAP-SIM |
| | | Summary |
|
| | | Chapter 10. WPA and RSN Key Hierarchy |
| | | Pairwise and Group Keys |
| | | Pairwise Key Hierarchy |
| | | Group Key Hierarchy |
| | | Key Hierarchy Using AES CCMP |
| | | Mixed Environments |
| | | Summary of Key Hierarchies |
| | | Details of Key Derivation for WPA |
| | | Nonce Selection |
| | | Computing the Temporal Keys |
| | | Summary |
|
| | | Chapter 11. TKIP |
| | | What Is TKIP and Why Was It Created? |
| | | TKIP Overview |
| | | Per-Packet Key Mixing |
| | | TKIP Implementation Details |
| | | Message Integrity Michael |
| | | Per-Packet Key Mixing |
| | | Summary |
|
| | | Chapter 12. AES CCMP |
| | | Introduction |
| | | Why AES? |
| | | AES Overview |
| | | How CCMP Is Used in RSN |
| | | Summary |
|
| | | Chapter 13. Wi-Fi LAN Coordination: ESS and IBSS |
| | | Network Coordination |
| | | WPA/RSN Information Element |
| | | Preauthentication Using IEEE 802.1X |
| | | IBSS Ad-Hoc Networks |
| | | Summary |
|
|
| | Part III. Wi-Fi Security in the Real World |
| | | Chapter 14. Public Wireless Hotspots |
| | | Development of Hotspots |
| | | Security Issues in Public Hotspots |
| | | How Hotspots Are Organized |
| | | Different Types of Hotspots |
| | | How to Protect Yourself When Using a Hotspot |
| | | Summary |
|
| | | Chapter 15. Known Attacks: Technical Review |
| | | Review of Basic Security Mechanisms |
| | | Review of Previous IEEE 802.11 Security Mechanisms |
| | | Attacks Against the Previous IEEE 802.11 Security Mechanisms |
| | | Man-in-the-Middle Attacks |
| | | Problems Created by Man-in-the-Middle Attacks |
| | | Denial-of-Service Attacks |
| | | Summary |
|
| | | Chapter 16. Actual Attack Tools |
| | | Attacker Goals |
| | | Process |
| | | Example Scenarios |
| | | Other Tools of Interest |
| | | Summary |
|
| | | Chapter 17. Open Source Implementation Example |
| | | General Architecture Design Guidelines |
| | | Protecting a Deployed Network |
| | | Planning to Deploy a WPA Network |
| | | Deploying the Infrastructure |
| | | Practical Example Based on Open Source Projects |
| | | Summary |
| | | Acknowledgments |
| | | References and More Information |
|
|
| | Appendixes |
| | | Appendix A. Overview of the AES Block Cipher |
| | | Finite Field Arithmetic |
| | | Steps in the AES Encryption Process |
|
| | | Appendix B. Example Message Modification |
| | | Example Message Modification |
|
| | | Appendix C. Verifying the Integrity of Downloaded Files |
| | | Checking the MD5 Digest |
| | | Checking the GPG Signature |
|
|
| | Acronyms |
| | References |