SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.
The authors provide information to satisfy the expert's hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes.
The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts.
Analyzing the Crossover Virus: The First PC to Windows Handheld Cross-infector
Attack of the Clones: Is Lindows the Real Deal?
Close Encounters of the Hacker Kind - Part 2 of the Story From the Front Line
Close Encounters of the Hacker Kind: A Story from the Front Line
Fighting Fire with Fire: Designing a "Good" Computer Virus
Going on the Defensive: Intrusion-Detection Systems
How To Build the Ultimate Gaming System on a Budget, Part 2: Choosing the Motherboard
How To Build the Ultimate Gaming System on a Budget, Part 3: Choosing the Graphics Card
How To Build the Ultimate Gaming System on a Budget, Part 4: Putting It All Together
How To Build the Ultimate Gaming System on a Budget, Step by Step, Part 1
Monster-Mod: How To Wear Your Computer, Part 1
Monster-Mod: How To Wear Your Computer, Part 2
Monster-Mod: How To Wear Your Computer, Part 3
Raw Sockets Revisited: What Happened to the End of the Internet?
Reverse-Engineering the First Pocket PC Trojan, Part 1
Reverse-Engineering the First Pocket PC Trojan, Part 2
SQL Server Attacks: Hacking, Cracking, and Protection Techniques
Warez All that Pirated Software Coming From?
For Wireless Security, First Understand Wireless Programming
Introduction.
I. WIRELESS FUNDAMENTALS.
1. Wireless Hardware.
Access Points. Linksys WAP11. NetGear ME102. Antennas. Radome-Enclosed Yagi Antenna: HyperLink HG2415Y. Parabolic Grid Antenna: HyperLink HG2419G. SigMax Omni-Directional: Signull SMISMCO10. SigMax Circular Yagi: Signull SMISMCY12. TechnoLab Log Periodic Yagi. Wireless NIC. ORiNOCO PC Card. Handheld Devices. Compaq iPAQ. Constructing Your Test Lab. Summary.
2. Wireless Network Protocols.
Inside the 802.11 Standard. Inside the 802.11a Standard. Inside the 802.11g Standard. 802.11a Versus 802.11b. Understanding HomeRF. Understanding IrDA. Understanding Bluetooth. Summary.
3. Wireless Programming.
HTML/XML/XHTML. WAP/WML/WMLScript. Openwave SDK. i-mode. Java. .NET. Summary.
4. WEP Security.
WEP Introduction. RC4 Encryption. How RC4 Works. Summary.
II. WIRELESS THREATS.
5. Cracking WEP.
WEP Review. Data Analysis. Technical Example. IV Collision. Key Extraction. Summary.
6. Hacking Techniques.
Diverse Hacker Attack Methods. Sniffing. Spoofing and Session Hijacking. Understanding Buffer Overflows. Unexpected Input. Denial-of-Service Attacks. Summary.
7. Wireless Attacks.
Surveillance. War Driving. Client-to-Client Hacking. Rogue Access Points. Jamming (Denial of Service). Practical WEP Cracking. Summary.
8. Airborne Viruses.
Airborne Viruses. Virus Overview. Virus Prevention. Hostile Web Pages and Scripting. Palm OS. Viruses on Windows CE .NET. Handset Viruses. Summary.
III. TOOLS OF THE TRADE.
9. Auditing Tools.
Ethereal. NetStumbler. Kismet. AirSnort. WEPCrack. Windows XP. AiroPeek NX. Summary.
10. Pocket PC Hacking.
Important URLs. Pocket PC Installation. WLAN Drivers. MiniStumbler. CENiffer. Net Force and vxUtil. IBM Wireless Security Auditor. Summary.
11. Wireless Hack Walkthrough.
The Test Network. Defining the Goal. Investigation and Discovery. Attack Preparation. Execution. Clean Up. Summary.
IV. WIRELESS SECURITY.
12. Securing the WLAN.
Access Point-Based Security Measures. Third-Party Security Methods. Funk's Steel-Belted Radius. WLAN Protection Enhancements. Summary.
13. Virtual Private Networks.
VPN Review. Tunneling. IPsec. L2TP. Attacks Against VPNs. Deploying VPNs in WLANs. Summary.
14. Intrusion Detection Systems.
Log File Monitors. Integrity Monitors. Signature Scanners. IDS Theory. Receiver Operating Characteristic Curves. Hacking Through IDSs. The Future of IDSs. Summary.
15. Wireless Public Key Infrastructure.
Public Key Cryptography. Digital Signatures. Certificate Authorities. Wireless PKI Implementation. Transaction Confirmation. Integrity of User Identities. Third-Party Services. WAP PKI. Summary.
V. APPENDIXES.
Appendix A: Decimal/Hex/Binary Conversion Table.
Appendix B: WEPCrack Exploit Code Example.
GNU General Public License.
Appendix C: References.