Index W


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

WAP
       (Wireless Application Protocol)   2nd   3rd  
       application stack
               network bearers  
               Wireless Application Environment (WAE)  
               Wireless Datagram Protocol (WDP)  
               Wireless Session Protocol (WSP)  
               Wireless Transaction Session Protocol (WTSP)  
               Wireless Transport Layer Security (WTLS)  
       certificate delivery   2nd  
       certificate enrollment   2nd  
       certificate requests   2nd  
       device certificates   2nd  
       PCS devices
               browsing   2nd   3rd  
       security tokens   2nd  
               combined SIM/WIM chip   2nd  
               separate dual-slot device with removable WIM chip  
               separate hardware component WIM chip  
               separate SIM/WIM chip   2nd  
               WIM implementation methods   2nd  
       Service and Device Management (SDM)   2nd   3rd  
       SmartTrust Trusted Operator Services (TOS)   2nd   3rd   4th   5th   6th  
       SmartTrust Wireless Internet Browser (WIB)
               plug-ins   2nd  
WAP PKI Model
       CA Public Key Certificates (WTLS Class 2)   2nd   3rd  
       certificate delivery   2nd  
       certificate enrollment   2nd  
       certificate management   2nd   3rd  
       certificate requests   2nd  
       Client Public Key Certificates (WMLScript SignText)   2nd   3rd   4th  
       Client Public Key Certificates (WTLS Class 3)   2nd   3rd  
       device certificates   2nd  
       limitations   2nd  
       security tokens   2nd  
               combined SIM/WIM chip   2nd  
               dual-slot device with removable WIM chip  
               hardware component WIM chip  
               separate SIM/WIM chip   2nd  
               WIM implementation methods   2nd  
       Service and Device Management (SDM)   2nd   3rd  
       SmartTrust software   2nd  
       SmartTrust Wireless Internet Browser (WIB)   2nd  
       Trusted Operator Services (TOS)   2nd   3rd   4th   5th   6th  
war driving
       Electronic Communications Privacy Act (ECPA)  
       legality of  
       NetStumbler software   2nd  
               configuring   2nd   3rd  
       ORiNOCO software
               configuring   2nd   3rd  
       popularity of  
       required hardware   2nd  
       search areas  
       terminology  
       typical person  
       vehicle setups   2nd  
Web browsers
        hostile Web pages
               potential damage   2nd  
       Internet Explorer
               security settings  
Web forms
       malicious hacker exploits   2nd  
Web pages
       dynamic
               vulnerability to attack   2nd   3rd  
       hostile
               potential damage   2nd  
       scripts
               programming holes   2nd  
               vulnerability prevention   2nd  
       static   2nd   3rd  
Web servers
       DMZ (demilitarized zone) placement   2nd  
       spam attacks
                open relay configuration  
       SYN flooding
               process   2nd   3rd  
Web sites
       AiroPeek NX  
       AirSnort  
       Compaq  
       Entrust.com
               wireless PKI implementation   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       Ethereal  
       Funk.com   2nd  
       GTK.org  
       HyperLink Tech   2nd   3rd   4th  
       Kismet  
       Linksys  
       NetGear  
       NetStumbler  
       NetworkECG  
       ORiNONO Wireless   2nd  
       Perl.com  
       Pocket PC
               hacking resources   2nd  
       reference resources   2nd  
       Signull   2nd   3rd   4th  
       SmartTrust WAP PKI software   2nd  
       Snort.org   2nd  
       TCPDump.org  
       TechnoLab   2nd  
       Tripwire   2nd  
       WildPackets.com   2nd   3rd  
       Wiretrip.net   2nd  
WEP
       (Wired Equivalency Privacy)  
       (Wireless Equivalent Privacy)  
       128-bit  
        checksumming process  
       crackability of   2nd  
       decryption process   2nd  
       development of   2nd  
       encryption
               cracking   2nd  
       encryption process  
       hackers
               bitwise comparisons   2nd   3rd  
               data capture   2nd   3rd   4th  
       IEEE 802.11 standard   2nd  
       IV (Initialization Vector)  
               collisions   2nd   3rd   4th  
               preshared password array values  
               weak formats   2nd  
       key extraction
               cracking   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  
       live wireless data transmission example   2nd   3rd  
       original intent of  
       plaintext
               predetermining   2nd  
       protection levels   2nd  
       RC4 algorithm  
               checksums  
               decryption process  
               Key Scheduling Algorithm   2nd   3rd   4th   5th   6th  
               Key Scheduling Algorithm functions   2nd  
               packet keys   2nd  
               PRG Algorithm   2nd   3rd   4th  
       RC4 encryption  
               64-bit/128-bit   2nd   3rd  
               implementation of   2nd  
               Initialization Vector (IV) weaknesses  
               Initiation Vector (IV) weaknesses  
               key strength   2nd   3rd  
       security flaws   2nd  
       SNAP headers
               password bytes   2nd  
       technical example
                ciphertext creation  
               comparable equation 1   2nd  
               comparable equation 2  
                keystream retrieval   2nd  
       WEPCrack code exploit example
               Prisdump Parser (Listing B.2)   2nd   3rd   4th   5th   6th  
               Prism-decode.pl module (Listing B.1)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
               RC4 Keyscheduler (Listing B.3)   2nd   3rd   4th   5th   6th   7th   8th  
WEPCrack
       development of  
       features   2nd  
       installing  
       output  
        prismdump program   2nd   3rd  
               prism-getIV.pl script   2nd  
               weakIVGen.pl script   2nd  
               WEPCrack.pl script   2nd  
       scripts   2nd  
       supported platforms  
       Web site  
WEPCrack code exploit example
       Prisdump Parser (Listing B.2)   2nd   3rd   4th   5th   6th  
       Prism-decode.pl module (Listing B.1)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
       RC4 Keyscheduler (Listing B.3)   2nd   3rd   4th   5th   6th   7th   8th  
WEPCRACK script   2nd  
Whisker HTTP mutation tool   2nd  
whois utility (NetForce)  
whois utility (vxUtil)  
WIB (Wireless Internet Browser)  
wildPackets.com Web site  
WildPackets.com Web site
       AiroPeek sniffer   2nd  
WIM
       (Wireless Identity Module)  
       dual-slot devices
               WAP security tokens  
       hardware component
               WAP security tokens  
       implmentation methods (Table )   2nd  
Windows 2000
       NetStumbler
               TCP/IP settings, turning off   2nd  
Windows CE
       Pocket PC
               hacking overview   2nd  
               Web site resources   2nd  
Windows NT
       NetStumbler
               TCP/IP settings, turning off   2nd  
Windows XP  
       auditing advantages  
       NetStumbler
               database results, viewing   2nd   3rd  
               TCP/IP settings, turning off   2nd   3rd  
       WLAN detector
               launching   2nd   3rd   4th  
       WNICs
               installing   2nd  
winipcfg tool
       MAC addresses
               displaying (Windows 95/98/ME)  
WinPcap utility
       Ethereal for Windows  
               installing  
Wired Equivalency Privacy,   [See WEP]
Wireless Application Environment (WAE)
       WAP application stack  
Wireless Application Protocol,   [See WAP]2nd   [See WAP]3rd   [See WAP]
wireless attacks
       access points
               target proliferation  
        client-to-client hacking   2nd   3rd   4th  
               AiroPeek sniffer   2nd  
               WNICs, PEER mode   2nd   3rd   4th  
       frequency jamming (DoS attacks)   2nd   3rd   4th   5th  
       overview   2nd   3rd  
       proliferation of   2nd   3rd  
       rogue Access Points (APs)   2nd   3rd   4th  
       surveillance
               reconnaisance   2nd   3rd   4th  
       war driving
               Electronic Communications Privacy Act (ECPA)  
               legality of  
               NetStumbler software   2nd   3rd   4th   5th  
               OriNOCO software   2nd   3rd  
               popularity of  
               required hardware   2nd  
               search areas  
               terminology  
               typical person  
               vehicle setups   2nd  
Wireless Datagram Protocol (WDP)
       WAP application stack  
Wireless Equivalent Privacy,   [See WEP]
Wireless Internet Browser (WIB)  
       plug-ins (SmartTrust)   2nd  
Wireless Markup Language,   [See WML]2nd   [See WML]
Wireless Network Interface Cards,   [See WNICs]2nd   [See WNICs]
wireless network protocols
       802.11 standard (IEEE)  
               CSMA/Collision Avoidance   2nd  
               overview   2nd  
               prior techologies  
       802.11a standard (IEEE)
               5GHz range  
               Orthogonal Frequency Division Multiplexing  
               overview  
               versus 802.11b standard   2nd  
       802.11b standard (IEEE)
               2.4 GHz range   2nd  
               DSSS (direct-sequence spread spectrum)  
               versus 802.11a standard   2nd  
       802.11g standard (IEEE)
               overview  
       Bluetooth
               communication process   2nd  
               development of  
               overview  
               piconet  
               security features   2nd  
               techincal specifications  
       HomeRF
               FHSS standard   2nd  
               overview  
       IrDA
               overview   2nd   3rd  
               PANs (personal are networks)  
               potential light transmission problems  
       overview   2nd  
wireless networks
       access steps
               attack preparation   2nd  
               clean up stage   2nd  
               defining the goal   2nd  
               execution stage   2nd  
               investigation and discovery   2nd   3rd   4th   5th   6th   7th   8th  
               test network scenario   2nd  
       hackers
               access overview   2nd   3rd  
       security auditors
               access overview   2nd   3rd  
wireless PKI
       Entrust.com example  
               2nd factor authentication   2nd  
               digital signatures  
               GetAccess server access   2nd  
               Secure Web Portal solution   2nd  
               third party services   2nd  
               transaction confirmations  
                user identity integrity   2nd  
       SmartTrust Trusted Operator Services (TOS)   2nd   3rd   4th   5th   6th  
       SmartTrust Wireless Internet Browser (WIB)
               plug-ins   2nd  
       WAP
               certificate delivery   2nd  
               certificate enrollment   2nd  
               certificate requests   2nd  
               device certificates   2nd  
               Service and Device Management (SDM)   2nd   3rd  
wireless programming languages
       .NET   2nd  
       HTML  
       i-mode   2nd  
       Java   2nd  
       overview   2nd  
       WML   2nd   3rd  
       WMLScript   2nd   3rd  
       XHTML   2nd   3rd   4th  
       XML   2nd   3rd  
wireless protocols
       WAP
               application stack   2nd   3rd   4th   5th   6th  
               PCS device browsing   2nd   3rd  
Wireless Session Protocol (WSP)
       WAP application stack  
wireless sniffers
       AiroPeek   2nd  
wireless test labs
       constructing   2nd   3rd  
       testing   2nd   3rd  
Wireless Transaction Session Protocol (WTSP)
       WAP application stack  
Wireless Transport Layer Security (WTLS)
       WAP application stack  
Wiretrip.net Web site   2nd  
wlanclt-ng commands
       Kismet  
WLANs
       access point-based security measures
               DMZ (demilitarized zone)   2nd  
               MAC-filtering   2nd   3rd   4th   5th   6th   7th   8th   9th  
               radiation zone control   2nd   3rd   4th   5th  
               WEP   2nd  
       AES (Advanced Encryption Standard)   2nd  
       drivers
               installing (Pocket PC)   2nd  
       firewalls
               implementing   2nd  
       intrustion detection systems (IDSs)   2nd  
       radiation zone
               signal bleeding   2nd   3rd   4th   5th  
       RADIUS (Remote Authentication Dial-In User Service) servers  
               Funk Steel-Belted   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
               typical configuration  
       SSL (Secure Sockets Layer)   2nd  
       TKIP (Temporal Key Integrity Protocol)   2nd   3rd   4th  
       VPNs
               deployment of   2nd  
               tunneling   2nd   3rd  
       Windows XP
               detector   2nd   3rd   4th  
WML
       (Wireless Markup Language)   2nd  
       applications
               Apache server configuration   2nd  
               creating  
               IIS server configuration  
       sample PCS cards   2nd  
WMLScript
       PCS client-side scripting   2nd   3rd  
WMLScript SignText
       WAP PKI Model
               Client Public Key Certificates   2nd   3rd   4th  
WNICs
       (Wireless Network Interface Cards)   2nd  
       AiroPeek NX support  
       IBM Wireless Security Auditor support  
       ORiNOCO PC Card
               Gold/Silver models   2nd  
       Windows XP
               installing   2nd  
worms
       holes  
       I Love You
               estimated damages  
       Morris
               damage estimates  
       versus viruses  
WTLS
       (Wireless Transport Layer Security protocol)   2nd   3rd  
       WAP PKI Model
               CA Public Key Certificates   2nd   3rd  
               Client Public Key Certificates   2nd   3rd  



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net