| | | Copyright |
| | | About the Authors |
| | | | About the Technical Editors |
|
| | | We Want to Hear from You! |
| | | | Reader Services |
|
| | | Introduction |
| | | Part I: Wireless Fundamentals |
| | | | Chapter 1. Wireless Hardware |
| | | | Access Points |
| | | | Linksys WAP11 |
| | | | NetGear ME102 |
| | | | Antennas |
| | | | Radome-Enclosed Yagi Antenna: HyperLink HG2415Y |
| | | | Parabolic Grid Antenna: HyperLink HG2419G |
| | | | SigMax Omni-Directional: Signull SMISMCO10 |
| | | | SigMax Circular Yagi: Signull SMISMCY12 |
| | | | TechnoLab Log Periodic Yagi |
| | | | Wireless NICs |
| | | | ORiNOCO PC Card |
| | | | Handheld Devices |
| | | | Compaq iPAQ |
| | | | Summary |
|
| | | | Chapter 2. Wireless Network Protocols |
| | | | Inside the 802.11 Standard |
| | | | Inside the 802.11g Standard |
| | | | 802.11a Versus 802.11b |
| | | | Understanding HomeRF |
| | | | Understanding IrDA |
| | | | Understanding Bluetooth |
| | | | Summary |
|
| | | | Chapter 3. Wireless Programming |
| | | | HTML/XML/XHTML |
| | | | WAP/WML/WMLScript |
| | | | Openwave SDK |
| | | | i-mode |
| | | | Java |
| | | | .NET |
| | | | Summary |
|
| | | | Chapter 4. WEP Security |
| | | | WEP Introduction |
| | | | RC4 Encryption |
| | | | How RC4 Works |
| | | | Summary |
|
|
| | | Part II: Wireless Threats |
| | | | Chapter 5. Cracking WEP |
| | | | WEP Review |
| | | | Data Analysis |
| | | | Technical Example |
| | | | IV Collision |
| | | | Key Extraction |
| | | | Summary |
|
| | | | Chapter 6. Hacking Techniques |
| | | | Diverse Hacker Attack Methods |
| | | | Sniffing |
| | | | Spoofing and Session Hijacking |
| | | | Understanding Buffer Overflows |
| | | | Unexpected Input |
| | | | Denial-of-Service Attacks |
| | | | Summary |
|
| | | | Chapter 7. Wireless Attacks |
| | | | Surveillance |
| | | | War Driving |
| | | | Client-to-Client Hacking |
| | | | Rogue Access Points |
| | | | Jamming (Denial of Service) |
| | | | Practical WEP Cracking |
| | | | Summary |
|
| | | | Chapter 8. Airborne Viruses |
| | | | Airborne Viruses |
| | | | Virus Overview |
| | | | Virus Prevention |
| | | | Hostile Web Pages and Scripting |
| | | | Palm OS |
| | | | Viruses on Windows CE .NET |
| | | | Handset Viruses |
| | | | Summary |
|
|
| | | Part III: Tools of the Trade |
| | | | Chapter 9. Auditing Tools |
| | | | Ethereal |
| | | | NetStumbler |
| | | | Kismet |
| | | | AirSnort |
| | | | WEPCrack |
| | | | Windows XP |
| | | | AiroPeek NX |
| | | | Summary |
|
| | | | Chapter 10. Pocket PC Hacking |
| | | | Important URLs |
| | | | Pocket PC Installation |
| | | | WLAN Drivers |
| | | | MiniStumbler |
| | | | CENiffer |
| | | | Net Force and vxUtil |
| | | | IBM Wireless Security Auditor |
| | | | Summary |
|
| | | | Chapter 11. Wireless Hack Walkthrough |
| | | | The Test Network |
| | | | Defining the Goal |
| | | | Investigation and Discovery |
| | | | Attack Preparation |
| | | | Execution |
| | | | Clean Up |
| | | | Summary |
|
|
| | | Part IV: Wireless Security |
| | | | Chapter 12. Securing the WLAN |
| | | | Access Point-Based Security Measures |
| | | | Third-Party Security Methods |
| | | | Funk's Steel-Belted Radius |
| | | | WLAN Protection Enhancements |
| | | | Summary |
|
| | | | Chapter 13. Virtual Private Networks |
| | | | VPN Review |
| | | | Tunneling |
| | | | IPsec |
| | | | L2TP |
| | | | Attacks Against VPNs |
| | | | Deploying VPNs in WLANs |
| | | | Summary |
|
| | | | Chapter 14. Intrusion Detection Systems |
| | | | Log File Monitors |
| | | | Integrity Monitors |
| | | | IDS Theory |
| | | | Receiver Operating Characteristic Curves |
| | | | Hacking Through IDSs |
| | | | The Future of IDSs |
| | | | Summary |
|
| | | | Chapter 15. Wireless Public Key Infrastructure |
| | | | Public Key Cryptography |
| | | | Digital Signatures |
| | | | Certificate Authorities |
| | | | Wireless PKI Implementation |
| | | | Transaction Confirmation |
| | | | Integrity of User Identities |
| | | | Third-Party Services |
| | | | WAP PKI |
| | | | Summary |
|
|
| | | Part V: Appendixes |
| | | | Appendix A. Decimal/Hex/Binary Conversion Table |
| | | | Appendix B. WEPCrack Exploit Code Example |
| | | | GNU General Public License |
|
| | | | Appendix C. References |
|
| | | Index |