|  | Copyright |
|  | Acknowledgments |
|  | About the Authors |
|  | Introduction |
|
|  | Why Does Wi-Foo Exist and for Whom Did We Write It? |
|
|  | What About the Funky Name? |
|
|  | How This Book Is Organized |
|  |
Chapter 1.
Real World Wireless Security |
|
|  | Why Do We Concentrate on 802.11 Security? |
|
|  | Getting a Grip on Reality: Wide Open 802.11 Networks Around Us |
|
|  | The Future of 802.11 Security: Is It as Bright as It Seems? |
|
|  | Summary |
|  |
Chapter 2.
Under Siege |
|
|  | Why Are "They" After Your Wireless Network? |
|
|  | Wireless Crackers: Who Are They? |
|
|  | Corporations, Small Companies, and Home Users: Targets Acquired |
|
|  | Target Yourself: Penetration Testing as Your First Line of Defense |
|
|  | Summary |
|  |
Chapter 3.
Putting the Gear Together: 802.11 Hardware |
|
|  | PDAs Versus Laptops |
|
|  | PCMCIA and CF Wireless Cards |
|
|  | Antennas |
|
|  | RF Amplifiers |
|
|  | RF Cables and Connectors |
|
|  | Summary |
|  |
Chapter 4.
Making the Engine Run: 802.11 Drivers and Utilities |
|
|  | Operating System, Open Source, and Closed Source |
|
|  | The Engine: Chipsets, Drivers, and Commands |
|
|  | Getting Used to Efficient Wireless Interface Configuration |
|
|  | Summary |
|  |
Chapter 5.
Learning to WarDrive: Network Mapping and Site Surveying |
|
|  | Active Scanning in Wireless Network Discovery |
|
|  | Monitor Mode Network Discovery and Traffic Analysis Tools |
|
|  | Tools That Use the iwlist scan Command |
|
|  | RF Signal Strength Monitoring Tools |
|
|  | Summary |
|  |
Chapter 6.
Assembling the Arsenal: Tools of the Trade |
|
|  | Encryption Cracking Tools |
|
|  | Wireless Frame-Generating Tools |
|
|  | Wireless Encrypted Traffic Injection Tools: Wepwedgie |
|
|  | Access Point Management Utilities |
|
|  | Summary |
|  |
Chapter 7.
Planning the Attack |
|
|  | The "Rig" |
|
|  | Network Footprinting |
|
|  | Site Survey Considerations and Planning |
|
|  | Proper Attack Timing and Battery Power Preservation |
|
|  | Stealth Issues in Wireless Penetration Testing |
|
|  | An Attack Sequence Walk-Through |
|
|  | Summary |
|  |
Chapter 8.
Breaking Through |
|
|  | The Easiest Way to Get in |
|
|  | A Short Fence to Climb: Bypassing Closed ESSIDs, MAC, and Protocols Filtering |
|
|  | Picking a Trivial Lock: Various Means of Cracking WEP |
|
|  | Picking the Trivial Lock in a Less Trivial Way: Injecting Traffic to Accelerate WEP Cracking |
|
|  | Field Observations in WEP Cracking |
|
|  | Cracking TKIP: The New Menace |
|
|  | The Frame of Deception: Wireless Man-in-the-Middle Attacks and Rogue Access Points Deployment |
|
|  | Breaking the Secure Safe |
|
|  | The Last Resort: Wireless DoS Attacks |
|
|  | Summary |
|  |
Chapter 9.
Looting and Pillaging: The Enemy Inside |
|
|  | Step 1: Analyze the Network Traffic |
|
|  | Step 2: Associate to WLAN and Detect Sniffers |
|
|  | Step 3: Identify the Hosts Present and Perform Passive Operating System Fingerprinting |
|
|  | Step 4: Scan and Exploit Vulnerable Hosts on WLAN |
|
|  | Step 5: Take the Attack to the Wired Side |
|
|  | Step 6: Check Wireless-to-Wired Gateway Egress Filtering Rules |
|
|  | Summary |
|  |
Chapter 10.
Building the Citadel: An Introduction to Wireless LAN Defense |
|
|  | Wireless Security Policy: The Cornerstone |
|
|  | Layer 1 Wireless Security Basics |
|
|  | The Usefulness of WEP, Closed ESSIDs, MAC Filtering, and SSH Port Forwarding |
|
|  | Secure Wireless Network Positioning and VLANs |
|
|  | Deploying a Linux-Based, Custom-Built Hardened Wireless Gateway |
|
|  | Proprietary Improvements to WEP and WEP Usage |
|
|  | 802.11i Wireless Security Standard and WPA: The New Hope |
|
|  | Summary |
|  |
Chapter 11.
Introduction to Applied Cryptography: Symmetric Ciphers |
|
|  | Introduction to Applied Cryptography and Steganography |
|
|  | Modern-Day Cipher Structure and Operation Modes |
|
|  | Bit by Bit: Streaming Ciphers and Wireless Security |
|
|  | The Quest for AES |
|
|  | Between DES and AES: Common Ciphers of the Transition Period |
|
|  | Selecting a Symmetric Cipher for Your Networking or Programming Needs |
|
|  | Summary |
|  |
Chapter 12.
Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms |
|
|  | Cryptographic Hash Functions |
|
|  | Dissecting an Example Standard One-Way Hash Function |
|
|  | Hash Functions, Their Performance, and HMACs |
|
|  | Asymmetric Cryptography: A Different Animal |
|
|  | Summary |
|  |
Chapter 13.
The Fortress Gates: User Authentication in Wireless Security |
|
|  | RADIUS |
|
|  | Installation of FreeRADIUS |
|
|  | User Accounting |
|
|  | RADIUS Vulnerabilities |
|
|  | RADIUS-Related Tools |
|
|  | 802.1x: The Gates to Your Wireless Fortress |
|
|  | LDAP |
|
|  | NoCat: An Alternative Method of Wireless User Authentication |
|
|  | Summary |
|  |
Chapter 14.
Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs |
|
|  | Why You Might Want to Deploy a VPN |
|
|  | VPN Topologies Review: The Wireless Perspective |
|
|  | Common VPN and Tunneling Protocols |
|
|  | Alternative VPN Implementations |
|
|  | The Main Player in the Field: IPSec Protocols, Operations, and Modes Overview |
|
|  | Deploying Affordable IPSec VPNs with FreeS/WAN |
|
|  | Summary |
|  |
Chapter 15.
Counterintelligence: Wireless IDS Systems |
|
|  | Categorizing Suspicious Events on WLANs |
|
|  | Examples and Analysis of Common Wireless Attack Signatures |
|
|  | Radars Up! Deploying a Wireless IDS Solution for Your WLAN |
|
|  | Summary |
|
|  | Afterword |
|  |
Appendix A.
Decibel–Watts Conversion Table |
|  |
Appendix B.
802.11 Wireless Equipment |
|  |
Appendix C.
Antenna Irradiation Patterns |
|
|  | Omni-Directionals: |
|
|  | Semi-Directionals: |
|
|  | Highly-directionals |
|  |
Appendix D.
Wireless Utilities Manpages |
|
|  |
Section 1.
Iwconfig |
|
|  |
Section 2.
Iwpriv |
|
|  |
Section 3.
Iwlist |
|
|  |
Section 4.
Wicontrol |
|
|  |
Section 5.
Ancontrol |
|  |
Appendix E.
Signal Loss for Obstacle Types |
|  |
Appendix F.
Warchalking Signs |
|
|  | Original Signs |
|
|  | Proposed New Signs |
|  |
Appendix G.
Wireless Penetration Testing Template |
|
|  | Arhont Ltd Wireless Network Security and Stability Audit Checklist Template |
|
|  |
Section 1.
Reasons for an audit |
|
|  |
Section 2.
Preliminary investigations |
|
|  |
Section 3.
Wireless site survey |
|
|  |
Section 4.
Network security features present |
|
|  |
Section 5.
Network problems / anomalies detected |
|
|  |
Section 6.
Wireless penetration testing procedure |
|
|  |
Section 7.
Final recommendations |
|  |
Appendix H.
Default SSIDs for Several Common 802.11 Products |
|  |
Glossary |
|  | Index |