Foreword |
|
xvii | |
Introduction |
|
1 | (1) |
|
Who Should Read This Book? |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
How This Book Is Organized |
|
|
3 | (2) |
|
Part I: Building the Foundation for Testing Wireless Networks |
|
|
4 | (1) |
|
Part II: Getting Rolling with Common Wi-Fi Hacks |
|
|
4 | (1) |
|
Part III: Advanced Wi-Fi Hacks |
|
|
4 | (1) |
|
Part IV: The Part of Tens |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Part I: Building the Foundation for Testing Wireless Networks |
|
|
7 | (58) |
|
Introduction to Wireless Hacking |
|
|
9 | (10) |
|
Why You Need to Test Your Wireless Systems |
|
|
10 | (5) |
|
Knowing the dangers your systems face |
|
|
11 | (1) |
|
|
12 | (2) |
|
Wireless-network complexities |
|
|
14 | (1) |
|
Getting Your Ducks in a Row |
|
|
15 | (1) |
|
Gathering the Right Tools |
|
|
16 | (1) |
|
To Protect, You Must Inspect |
|
|
17 | (2) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
The Wireless Hacking Process |
|
|
19 | (12) |
|
Obeying the Ten Commandments of Ethical Hacking |
|
|
19 | (7) |
|
|
20 | (1) |
|
Thou shalt plan thy work, lest thou go off course |
|
|
21 | (1) |
|
Thou shalt obtain permission |
|
|
21 | (1) |
|
Thou shalt work ethically |
|
|
22 | (1) |
|
|
22 | (1) |
|
Thou shalt respect the privacy of others |
|
|
23 | (1) |
|
|
23 | (1) |
|
Thou shalt use a ``scientific'' process |
|
|
24 | (1) |
|
Thou shalt not covet thy neighbor's tools |
|
|
24 | (1) |
|
Thou shalt report all thy findings |
|
|
25 | (1) |
|
|
26 | (5) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (3) |
|
Implementing a Testing Methodology |
|
|
31 | (12) |
|
Determining What Others Know |
|
|
32 | (3) |
|
|
32 | (1) |
|
Footprinting: Gathering what's in the public eye |
|
|
33 | (2) |
|
|
35 | (2) |
|
|
37 | (2) |
|
Determining More about What's Running |
|
|
39 | (1) |
|
Performing a Vulnerability Assessment |
|
|
39 | (2) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (2) |
|
|
43 | (22) |
|
|
44 | (1) |
|
The personal digital assistant |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (12) |
|
|
45 | (10) |
|
Linux distributions on CD |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (2) |
|
|
57 | (2) |
|
|
59 | (1) |
|
|
59 | (3) |
|
|
62 | (1) |
|
|
63 | (2) |
|
Part II: Getting Rolling with Common Wi-Fi Hacks |
|
|
65 | (88) |
|
|
67 | (14) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
70 | (4) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (2) |
|
|
76 | (1) |
|
|
77 | (1) |
|
Human (In)Security Countermeasures |
|
|
78 | (3) |
|
Enforce a wireless security policy |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
Scan for unauthorized equipment |
|
|
80 | (1) |
|
Secure your systems from the start |
|
|
80 | (1) |
|
|
81 | (16) |
|
|
81 | (9) |
|
Using Linux Wireless Extension and Wireless Tools |
|
|
81 | (6) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (2) |
|
Network Physical Security Countermeasures |
|
|
90 | (7) |
|
Checking for unauthorized users |
|
|
90 | (1) |
|
|
91 | (3) |
|
Adjusting your signal strength |
|
|
94 | (3) |
|
|
97 | (16) |
|
|
98 | (1) |
|
|
99 | (4) |
|
|
99 | (3) |
|
|
102 | (1) |
|
Looking for General Client Vulnerabilities |
|
|
103 | (6) |
|
|
104 | (1) |
|
Linux application mapping |
|
|
105 | (1) |
|
|
106 | (3) |
|
|
109 | (2) |
|
Wireless Client Countermeasures |
|
|
111 | (2) |
|
Discovering Default Settings |
|
|
113 | (18) |
|
|
113 | (7) |
|
|
113 | (1) |
|
This is AirTraf control, you are cleared to sniff |
|
|
114 | (1) |
|
Let me AiroPeek at your data |
|
|
114 | (1) |
|
Another CommView of your data |
|
|
115 | (2) |
|
|
117 | (2) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (5) |
|
|
120 | (4) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
127 | (1) |
|
|
128 | (1) |
|
Default-Setting Countermeasures |
|
|
128 | (3) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (2) |
|
|
131 | (22) |
|
|
131 | (2) |
|
Installing and Running NetStumbler |
|
|
133 | (1) |
|
|
134 | (7) |
|
|
141 | (7) |
|
|
148 | (5) |
|
Using StumbVerter and MapPoint |
|
|
149 | (1) |
|
Using Microsoft Streets & Trips |
|
|
150 | (1) |
|
|
151 | (2) |
|
Part III: Advanced Wi-Fi Hacks |
|
|
153 | (148) |
|
|
155 | (22) |
|
Using Advanced Wardriving Software |
|
|
155 | (19) |
|
Installing and using Kismet |
|
|
156 | (11) |
|
Installing and using Wellenreiter |
|
|
167 | (1) |
|
|
168 | (2) |
|
Installing and using MiniStumbler |
|
|
170 | (3) |
|
Using other wardriving software |
|
|
173 | (1) |
|
Organization Wardriving Countermeasures |
|
|
174 | (3) |
|
|
174 | (1) |
|
Disabling probe responses |
|
|
175 | (1) |
|
Increasing beacon broadcast intervals |
|
|
175 | (1) |
|
Fake 'em out with a honeypot |
|
|
175 | (2) |
|
Unauthorized Wireless Devices |
|
|
177 | (18) |
|
|
178 | (1) |
|
Wireless System Configurations |
|
|
179 | (2) |
|
Characteristics of Unauthorized Systems |
|
|
181 | (3) |
|
|
184 | (2) |
|
|
186 | (2) |
|
Network-Analysis Software |
|
|
188 | (5) |
|
|
188 | (3) |
|
|
191 | (2) |
|
Additional Software Options |
|
|
193 | (1) |
|
|
193 | (1) |
|
Unauthorized System Countermeasures |
|
|
193 | (2) |
|
|
195 | (30) |
|
|
196 | (1) |
|
|
197 | (11) |
|
Changing your MAC in Linux |
|
|
198 | (1) |
|
Tweaking your Windows settings |
|
|
199 | (4) |
|
|
203 | (1) |
|
A walk down MAC-Spoofing Lane |
|
|
204 | (4) |
|
Who's that Man in the Middle? |
|
|
208 | (5) |
|
|
209 | (2) |
|
|
211 | (2) |
|
SNMP: That's Why They Call It Simple |
|
|
213 | (4) |
|
All Hail the Queensland Attack |
|
|
217 | (1) |
|
Sniffing for Network Problems |
|
|
218 | (4) |
|
Network-analysis programs |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
220 | (2) |
|
Network Attack Countermeasures |
|
|
222 | (3) |
|
Denial-of-Service Attacks |
|
|
225 | (30) |
|
|
227 | (2) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (5) |
|
Common signal interrupters |
|
|
230 | (1) |
|
|
230 | (2) |
|
Fight the power generators |
|
|
232 | (2) |
|
|
234 | (7) |
|
|
234 | (6) |
|
|
240 | (1) |
|
|
241 | (9) |
|
|
242 | (1) |
|
|
242 | (7) |
|
Invalid authentications via fata_jack |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (4) |
|
|
251 | (1) |
|
|
251 | (2) |
|
|
253 | (1) |
|
Use a Network Monitoring System |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (26) |
|
|
255 | (1) |
|
Protecting Message Privacy |
|
|
256 | (1) |
|
Protecting Message Integrity |
|
|
256 | (1) |
|
|
257 | (2) |
|
|
259 | (2) |
|
Other WEP Problems to Look For |
|
|
261 | (2) |
|
|
263 | (1) |
|
|
263 | (1) |
|
Active attack from both sides |
|
|
263 | (1) |
|
|
264 | (1) |
|
Passive attack decryption |
|
|
264 | (1) |
|
|
264 | (10) |
|
|
265 | (2) |
|
|
267 | (2) |
|
|
269 | (4) |
|
|
273 | (1) |
|
|
274 | (1) |
|
Countermeasures Against Home Network-Encryption Attacks |
|
|
274 | (3) |
|
|
275 | (1) |
|
|
275 | (2) |
|
Organization Encryption Attack Countermeasures |
|
|
277 | (4) |
|
|
278 | (1) |
|
|
278 | (3) |
|
|
281 | (20) |
|
Three States of Authentication |
|
|
281 | (2) |
|
Authentication according to IEEE 802.11 |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (4) |
|
This method seems easy to digest |
|
|
285 | (1) |
|
Not another PEAP out of you |
|
|
286 | (1) |
|
Another big LEAP for mankind |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
EAP-TTLS: That's funky software |
|
|
288 | (1) |
|
|
288 | (2) |
|
|
290 | (3) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
Network Authentication Countermeasures |
|
|
293 | (8) |
|
WPA improves the 8021.1 picture |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
Using the Auditor Collection |
|
|
297 | (4) |
|
Part IV: The Part of Tens |
|
|
301 | (24) |
|
Ten Essential Tools for Hacking Wireless Networks |
|
|
303 | (4) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Antennas and Connecting Cables |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Wireless Network Analyzer |
|
|
305 | (1) |
|
|
305 | (1) |
|
Vulnerability Assessment Tool |
|
|
305 | (1) |
|
|
305 | (1) |
|
An 802.11 Reference Guide |
|
|
305 | (2) |
|
Ten Wireless Security-Testing Mistakes |
|
|
307 | (14) |
|
Skipping the Planning Process |
|
|
307 | (1) |
|
Not Involving Others in Testing |
|
|
308 | (1) |
|
|
308 | (1) |
|
Forgetting to Unbind the NIC When Wardriving |
|
|
309 | (3) |
|
Failing to Get Written Permission to Test |
|
|
312 | (1) |
|
Failing to Equip Yourself with the Proper Tools |
|
|
313 | (1) |
|
Over-Penetrating Live Networks |
|
|
314 | (1) |
|
|
314 | (1) |
|
Failing to Report Results or Follow Up |
|
|
314 | (2) |
|
|
316 | (5) |
|
Ten Tips for Following Up after Your Testing |
|
|
321 | (4) |
|
Organize and Prioritize Your Results |
|
|
321 | (1) |
|
Prepare a Professional Report |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
Document the Lessons Learned |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
Practice Using Your Wireless Tools |
|
|
324 | (1) |
|
Keep Up with Wireless Security Issues |
|
|
324 | (1) |
|
|
325 | (2) |
|
Appendix A: Wireless Hacking Resources |
|
|
327 | (14) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
Institute of Electrical and Electronics Engineers (IEEE): www.ieee.org |
|
|
328 | (1) |
|
Wi-Fi Alliance (formerly WECA): www.wifialliance.com |
|
|
329 | (1) |
|
|
329 | (2) |
|
Security Awareness and Training |
|
|
331 | (1) |
|
|
331 | (10) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
333 | (2) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
Dictionary files and word lists |
|
|
339 | (1) |
|
Gathering IP addresses and SSIDs |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
Appendix B: Glossary of Acronyms |
|
|
341 | (6) |
Index |
|
347 | |