My Account Log in

1 option

Wi-Foo / Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky.

LIBRA TK5105.59 .V53 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Author/Creator:
Vladimirov, Andrew A.
Contributor:
Gavrilenko, Konstantin V.
Mikhailovsky, Andrei A.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Wireless communication systems.
Physical Description:
xxvii, 555 pages : illustrations ; 24 cm
Other Title:
Secrets of wireless hacking
Place of Publication:
Boston, MA : Pearson Education, Inc., [2004]
Summary:
Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any wireless network. The authors introduce the "battlefield," exposing today's "wide open" 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless "citadels" -- including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more.
Contents:
Chapter 1 Real World Wireless Security 1
Why Do We Concentrate on 802.11 Security? 2
Getting a Grip on Reality: Wide Open 802.11 Networks Around Us 5
The Future of 802.11 Security: Is It as Bright as It Seems? 7
Chapter 2 Under Siege 11
Why Are "They" After Your Wireless Network? 11
Wireless Crackers: Who Are They? 15
Corporations, Small Companies, and Home Users: Targets Acquired 17
Target Yourself: Penetration Testing as Your First Line of Defense 20
Chapter 3 Putting the Gear Together: 802.11 Hardware 23
PDAs Versus Laptops 23
PCMCIA and CF Wireless Cards 25
Selecting or Assessing Your Wireless Client Card Chipset 26
Selecting or Assessing Your Wireless Client Card RF Characteristics 33
Antennas 36
RF Amplifiers 40
RF Cables and Connectors 41
Chapter 4 Making the Engine Run: 802.11 Drivers and Utilities 43
Operating System, Open Source, and Closed Source 43
The Engine: Chipsets, Drivers, and Commands 45
Making Your Client Card Work with Linux and BSD 46
Getting Used to Efficient Wireless Interface Configuration 54
Linux Wireless Extensions 55
Linux-wlan-ng Utilities 63
Cisco Aironet Configuration 66
Configuring Wireless Client Cards on BSD Systems 69
Chapter 5 Learning to WarDrive: Network Mapping and Site Surveying 71
Active Scanning in Wireless Network Discovery 72
Monitor Mode Network Discovery and Traffic Analysis Tools 76
Kismet 76
Wellenreiter 85
Airtraf 86
Gtkskan 88
Airfart 89
Mognet 90
WifiScanner 91
Miscellaneous Command-Line Scripts and Utilities 93
BSD Tools for Wireless Network Discovery and Traffic Logging 98
Tools That Use the iwlist scan Command 102
RF Signal Strength Monitoring Tools 104
Chapter 6 Assembling the Arsenal: Tools of the Trade 109
Encryption Cracking Tools 110
WEP Crackers 111
Tools to Retrieve WEP Keys Stored on the Client Hosts 118
Traffic Injection Tools Used to Accelerate WEP Cracking 118
802.1x Cracking Tools 120
Wireless Frame-Generating Tools 123
AirJack 123
File2air 126
Libwlan 127
FakeAP 130
Void11 131
Wnet 132
Wireless Encrypted Traffic Injection Tools: Wepwedgie 134
Access Point Management Utilities 139
Chapter 7 Planning the Attack 143
The "Rig" 143
Network Footprinting 145
Site Survey Considerations and Planning 147
Proper Attack Timing and Battery Power Preservation 151
Stealth Issues in Wireless Penetration Testing 152
An Attack Sequence Walk-Through 153
Chapter 8 Breaking Through 155
The Easiest Way to Get in 155
A Short Fence to Climb: Bypassing Closed ESSIDs, MAC, and Protocols Filtering 156
Picking a Trivial Lock: Various Means of Cracking WEP 161
WEP Brute-Forcing 161
The FMS Attack 163
An Improved FMS Attack 164
Picking the Trivial Lock in a Less Trivial Way: Injecting Traffic to Accelerate WEP Cracking 168
Field Observations in WEP Cracking 168
Cracking TKIP: The New Menace 169
The Frame of Deception: Wireless Man-in-the-Middle Attacks and Rogue Access Points Deployment 171
DIY: Rogue Access Points and Wireless Bridges for Penetration Testing 173
Hit or Miss: Physical Layer Man-in-the-Middle Attacks 178
Phishing in the Air: Man-in-the-Middle Attacks Combined 179
Breaking the Secure Safe 181
Crashing the Doors: Authentication Systems Attacks 181
Tapping the Tunnels: Attacks Against VPNs 186
The Last Resort: Wireless DoS Attacks 192
1. Physical Layer Attacks or Jamming 193
2. Spoofed Deassociation and Deauthentication Frames Floods 193
3. Spoofed Malformed Authentication Frame Attack 194
4. Filling Up the Access Point Association and Authentication Buffers 195
5. Frame Deletion Attack 196
6. DoS Attacks Based on Specific Wireless Network Settings 196
7. Attacks Against 802.11i Implementations 197
Chapter 9 Looting and Pillaging: The Enemy Inside 199
Step 1 Analyze the Network Traffic 200
802.11 Frames 200
Plaintext Data Transmission and Authentication Protocols 201
Network Protocols with Known Insecurities 203
DHCP, Routing, and Gateway Resilience Protocols 203
Syslog and NTP Traffic 205
Protocols That Shouldn't Be There 205
Step 2 Associate to WLAN and Detect Sniffers 206
Step 3 Identify the Hosts Present and Perform Passive Operating System Fingerprinting 208
Step 4 Scan and Exploit Vulnerable Hosts on WLAN 210
Step 5 Take the Attack to the Wired Side 213
Step 6 Check Wireless-to-Wired Gateway Egress Filtering Rules 218
Chapter 10 Building the Citadel: An Introduction to Wireless LAN Defense 221
Wireless Security Policy: The Cornerstone 221
1. Device Acceptability, Registration, Update, and Monitoring 222
2. User Education and Responsibility 222
3. Physical Security 223
4. Physical Layer Security 223
5. Network Deployment and Positioning 223
6. Security Countermeasures 224
7. Network Monitoring and Incident Response 224
8. Network Security and Stability Audits 225
Layer 1 Wireless Security Basics 225
The Usefulness of WEP, Closed ESSIDs, MAC Filtering, and SSH Port Forwarding 228
Secure Wireless Network Positioning and VLANs 231
Using Cisco Catalyst Switches and Aironet Access Points to Optimize Secure Wireless Network Design 231
Deploying a Linux-Based, Custom-Built Hardened Wireless Gateway 235
Proprietary Improvements to WEP and WEP Usage 242
802.11i Wireless Security Standard and WPA: The New Hope 244
Introducing the Sentinel: 802.1x 245
Patching the Major Hole: TKIP and CCMP 248
Chapter 11 Introduction to Applied Cryptography: Symmetric Ciphers 253
Introduction to Applied Cryptography and Steganography 254
Modern-Day Cipher Structure and Operation Modes 260
A Classical Example: Dissecting DES 260
Kerckhoff's Rule and Cipher Secrecy 264
The 802.11i Primer: A Cipher to Help Another Cipher 265
There Is More to a Cipher Than the Cipher: Understanding Cipher Operation Modes 268
Bit by Bit: Streaming Ciphers and Wireless Security 272
The Quest for AES 274
AES (Rijndael) 278
MARS 279
RC6 282
Twofish 284
Serpent 287
Between DES and AES: Common Ciphers of the Transition Period 290
3DES 290
Blowfish 291
IDEA 293
Selecting a Symmetric Cipher for Your Networking or Programming Needs 296
Chapter 12 Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms 303
Cryptographic Hash Functions 304
Dissecting an Example Standard One-Way Hash Function 305
Hash Functions, Their Performance, and HMACs 308
MIC: Weaker But Faster 309
Asymmetric Cryptography: A Different Animal 312
The Examples of Asymmetric Ciphers: ElGamal, RSA, and Elliptic Curves 314
Practical Use of Asymmetric Cryptography: Key Distribution, Authentication, and Digital Signatures 317
Chapter 13 The Fortress Gates: User Authentication in Wireless Security 323
Radius 323
Basics of AAA Framework 323
An Overview of the RADIUS Protocol 324
RADIUS Features 325
Packet Formats 326
Packet Types 327
Installation of FreeRADIUS 328
Configuration 329
User Accounting 334
RADIUS Vulnerabilities 335
Response Authenticator Attack 336
Password Attribute-Based Shared Secret Attack 336
User Password-Based Attack 336
Request Authenticator-Based Attacks 337
Replay of Server Responses 337
Shared Secret Issues 337
RADIUS-Related Tools 338
802.1x: The Gates to Your Wireless Fortress 339
Basics of EAP-TLS 339
FreeRADIUS Integration 343
Supplicants 345
An Example of Access Point Configuration: Orinoco AP-2000 351
LDAP 354
Installation of OpenLDAP 356
Configuration of OpenLDAP 358
Testing LDAP 362
Populating the LDAP Database 364
Centralizing Authentication with LDAP 367
Mobile Users and LDAP 372
LDAP-Related Tools 373
NoCat: An Alternative Method of Wireless User Authentication 376
Installation and Configuration of NoCat Gateway 378
Installation and Configuration of Authentication Server 379
Chapter
14 Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs 383
Why You Might Want to Deploy a VPN 385
VPN Topologies Review: The Wireless Perspective 386
Network-to-Network 386
Host-to-Network 388
Host-to-Host 389
Star 390
Mesh 391
Common VPN and Tunneling Protocols 391
IPSec 392
PPTP 392
GRE 393
L2TP 393
Alternative VPN Implementations 394
cIPe 394
OpenVPN 394
VTun 395
The Main Player in the Field: IPSec Protocols, Operations, and Modes Overview 395
Security Associations 396
AH 397
ESP 398
IP Compression 399
IPSec Key Exchange and Management Protocol 400
IKE 400
Perfect Forward Secrecy 402
Dead Peer Discovery 402
IPSec Road Warrior 403
Opportunistic Encryption 403
Deploying Affordable IPSec VPNs with FreeS/WAN 403
FreeS/WAN Compilation 404
FreeS/WAN Configuration 409
Network-to-Network VPN Topology Setting 415
Host-to-Network VPN Topology Setting 416
Windows 2000 Client Setup 418
Windows 2000 IPSec Client Configuration 423
Chapter 15 Counterintelligence: Wireless IDS Systems 435
Categorizing Suspicious Events on WLANs 437
1. RF/Physical Layer Events 437
2. Management/Control Frames Events 437
3. 802.1x/EAP Frames Events 438
4. WEP-Related Events 438
5. General Connectivity/Traffic Flow Events 439
6. Miscellaneous Events 439
Examples and Analysis of Common Wireless Attack Signatures 440
Radars Up! Deploying a Wireless IDS Solution for Your WLAN 446
Commercial Wireless IDS Systems 446
Open Source Wireless IDS Settings and Configuration 448
A Few Recommendations for DIY Wireless IDS Sensor Construction 451
Appendix A Decibel-Watts Conversion Table 457
Appendix B 802.11 Wireless Equipment 461
Appendix C Antenna Irradiation Patterns 469
Omni-Directionals 469
Semi-Directionals 470
Highly-Directionals 472
Appendix D Wireless Utilities Manpages 475
1. Iwconfig 475
2. Iwpriv 482
3. Iwlist 484
4. Wicontrol 486
5. Ancontrol 493
Appendix E Signal Loss for Obstacle Types 503
Appendix F Warchalking Signs 505
Original Signs 505
Proposed New Signs 506
Appendix G Wireless Penetration Testing Template 507
Arhont Ltd Wireless Network Security and Stability Audit Checklist Template 507
1 Reasons for an audit 507
2 Preliminary investigations 508
3 Wireless site survey 508
4 Network security features present 511
5 Network problems / anomalies detected 514
6 Wireless penetration testing procedure 518
7 Final recommendations 522
Appendix H Default SSIDs for Several Common 802.11 Products 523.
Notes:
Includes index.
ISBN:
0321202171
OCLC:
55964683

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account