Sunday, September 5, 2010

Wi-Foo The Secret of Wireless Hacking


Content of Index :

1. Real World Wireless Security
2. Under Siege
3. Putting the Gear Together: 802.11 Hardware
4. Making the Engine Run: 802.11 Drivers and Utilities
5. Learning to WarDrive: Network Mapping and Site Surveying
6. Assembling the Arsenal: Tools of the Trade
7. Planning the Attack
8. Breaking Through
9. Looting and Pillaging: The Enemy Inside
10. Building the Citadel: An Introduction to Wireless LAN Defence
11. Introduction to Applied Cryptography: Symmetric Ciphers
12. Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms
13. The Fortress Gates: User Authentication in Wireless Security
14. Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs
15. Counterintelligence: Wireless IDS Systems
Appendix A: Decibel-Watts Conversion Table
Appendix B: 802.11 Wireless Equipment
Appendix C: Antenna Irradiation Patterns
Appendix D: Wireless Utilities Manpages
Appendix E: Signal Loss for Obstacle Types
Appendix F: Warchalking Signs
Appendix G: Wireless Penetration Testing Template
Appendix H: Default SSIDs for Several Common 802.11 Products

Download