| |  | Copyright |
| |  | Acknowledgments |
| |  | About the Authors |
| |  | Introduction |
| |
|  | Why Does Wi-Foo Exist and for Whom Did We Write It? |
| |
|  | What About the Funky Name? |
| |
|  | How This Book Is Organized |
| |  |
Chapter 1.
Real World Wireless Security |
| |
|  | Why Do We Concentrate on 802.11 Security? |
| |
|  | Getting a Grip on Reality: Wide Open 802.11 Networks Around Us |
| |
|  | The Future of 802.11 Security: Is It as Bright as It Seems? |
| |
|  | Summary |
| |  |
Chapter 2.
Under Siege |
| |
|  | Why Are "They" After Your Wireless Network? |
| |
|  | Wireless Crackers: Who Are They? |
| |
|  | Corporations, Small Companies, and Home Users: Targets Acquired |
| |
|  | Target Yourself: Penetration Testing as Your First Line of Defense |
| |
|  | Summary |
| |  |
Chapter 3.
Putting the Gear Together: 802.11 Hardware |
| |
|  | PDAs Versus Laptops |
| |
|  | PCMCIA and CF Wireless Cards |
| |
|  | Antennas |
| |
|  | RF Amplifiers |
| |
|  | RF Cables and Connectors |
| |
|  | Summary |
| |  |
Chapter 4.
Making the Engine Run: 802.11 Drivers and Utilities |
| |
|  | Operating System, Open Source, and Closed Source |
| |
|  | The Engine: Chipsets, Drivers, and Commands |
| |
|  | Getting Used to Efficient Wireless Interface Configuration |
| |
|  | Summary |
| |  |
Chapter 5.
Learning to WarDrive: Network Mapping and Site Surveying |
| |
|  | Active Scanning in Wireless Network Discovery |
| |
|  | Monitor Mode Network Discovery and Traffic Analysis Tools |
| |
|  | Tools That Use the iwlist scan Command |
| |
|  | RF Signal Strength Monitoring Tools |
| |
|  | Summary |
| |  |
Chapter 6.
Assembling the Arsenal: Tools of the Trade |
| |
|  | Encryption Cracking Tools |
| |
|  | Wireless Frame-Generating Tools |
| |
|  | Wireless Encrypted Traffic Injection Tools: Wepwedgie |
| |
|  | Access Point Management Utilities |
| |
|  | Summary |
| |  |
Chapter 7.
Planning the Attack |
| |
|  | The "Rig" |
| |
|  | Network Footprinting |
| |
|  | Site Survey Considerations and Planning |
| |
|  | Proper Attack Timing and Battery Power Preservation |
| |
|  | Stealth Issues in Wireless Penetration Testing |
| |
|  | An Attack Sequence Walk-Through |
| |
|  | Summary |
| |  |
Chapter 8.
Breaking Through |
| |
|  | The Easiest Way to Get in |
| |
|  | A Short Fence to Climb: Bypassing Closed ESSIDs, MAC, and Protocols Filtering |
| |
|  | Picking a Trivial Lock: Various Means of Cracking WEP |
| |
|  | Picking the Trivial Lock in a Less Trivial Way: Injecting Traffic to Accelerate WEP Cracking |
| |
|  | Field Observations in WEP Cracking |
| |
|  | Cracking TKIP: The New Menace |
| |
|  | The Frame of Deception: Wireless Man-in-the-Middle Attacks and Rogue Access Points Deployment |
| |
|  | Breaking the Secure Safe |
| |
|  | The Last Resort: Wireless DoS Attacks |
| |
|  | Summary |
| |  |
Chapter 9.
Looting and Pillaging: The Enemy Inside |
| |
|  | Step 1: Analyze the Network Traffic |
| |
|  | Step 2: Associate to WLAN and Detect Sniffers |
| |
|  | Step 3: Identify the Hosts Present and Perform Passive Operating System Fingerprinting |
| |
|  | Step 4: Scan and Exploit Vulnerable Hosts on WLAN |
| |
|  | Step 5: Take the Attack to the Wired Side |
| |
|  | Step 6: Check Wireless-to-Wired Gateway Egress Filtering Rules |
| |
|  | Summary |
| |  |
Chapter 10.
Building the Citadel: An Introduction to Wireless LAN Defense |
| |
|  | Wireless Security Policy: The Cornerstone |
| |
|  | Layer 1 Wireless Security Basics |
| |
|  | The Usefulness of WEP, Closed ESSIDs, MAC Filtering, and SSH Port Forwarding |
| |
|  | Secure Wireless Network Positioning and VLANs |
| |
|  | Deploying a Linux-Based, Custom-Built Hardened Wireless Gateway |
| |
|  | Proprietary Improvements to WEP and WEP Usage |
| |
|  | 802.11i Wireless Security Standard and WPA: The New Hope |
| |
|  | Summary |
| |  |
Chapter 11.
Introduction to Applied Cryptography: Symmetric Ciphers |
| |
|  | Introduction to Applied Cryptography and Steganography |
| |
|  | Modern-Day Cipher Structure and Operation Modes |
| |
|  | Bit by Bit: Streaming Ciphers and Wireless Security |
| |
|  | The Quest for AES |
| |
|  | Between DES and AES: Common Ciphers of the Transition Period |
| |
|  | Selecting a Symmetric Cipher for Your Networking or Programming Needs |
| |
|  | Summary |
| |  |
Chapter 12.
Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms |
| |
|  | Cryptographic Hash Functions |
| |
|  | Dissecting an Example Standard One-Way Hash Function |
| |
|  | Hash Functions, Their Performance, and HMACs |
| |
|  | Asymmetric Cryptography: A Different Animal |
| |
|  | Summary |
| |  |
Chapter 13.
The Fortress Gates: User Authentication in Wireless Security |
| |
|  | RADIUS |
| |
|  | Installation of FreeRADIUS |
| |
|  | User Accounting |
| |
|  | RADIUS Vulnerabilities |
| |
|  | RADIUS-Related Tools |
| |
|  | 802.1x: The Gates to Your Wireless Fortress |
| |
|  | LDAP |
| |
|  | NoCat: An Alternative Method of Wireless User Authentication |
| |
|  | Summary |
| |  |
Chapter 14.
Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs |
| |
|  | Why You Might Want to Deploy a VPN |
| |
|  | VPN Topologies Review: The Wireless Perspective |
| |
|  | Common VPN and Tunneling Protocols |
| |
|  | Alternative VPN Implementations |
| |
|  | The Main Player in the Field: IPSec Protocols, Operations, and Modes Overview |
| |
|  | Deploying Affordable IPSec VPNs with FreeS/WAN |
| |
|  | Summary |
| |  |
Chapter 15.
Counterintelligence: Wireless IDS Systems |
| |
|  | Categorizing Suspicious Events on WLANs |
| |
|  | Examples and Analysis of Common Wireless Attack Signatures |
| |
|  | Radars Up! Deploying a Wireless IDS Solution for Your WLAN |
| |
|  | Summary |
| |
|  | Afterword |
| |  |
Appendix A.
Decibel–Watts Conversion Table |
| |  |
Appendix B.
802.11 Wireless Equipment |
| |  |
Appendix C.
Antenna Irradiation Patterns |
| |
|  | Omni-Directionals: |
| |
|  | Semi-Directionals: |
| |
|  | Highly-directionals |
| |  |
Appendix D.
Wireless Utilities Manpages |
| |
|  |
Section 1.
Iwconfig |
| |
|  |
Section 2.
Iwpriv |
| |
|  |
Section 3.
Iwlist |
| |
|  |
Section 4.
Wicontrol |
| |
|  |
Section 5.
Ancontrol |
| |  |
Appendix E.
Signal Loss for Obstacle Types |
| |  |
Appendix F.
Warchalking Signs |
| |
|  | Original Signs |
| |
|  | Proposed New Signs |
| |  |
Appendix G.
Wireless Penetration Testing Template |
| |
|  | Arhont Ltd Wireless Network Security and Stability Audit Checklist Template |
| |
|  |
Section 1.
Reasons for an audit |
| |
|  |
Section 2.
Preliminary investigations |
| |
|  |
Section 3.
Wireless site survey |
| |
|  |
Section 4.
Network security features present |
| |
|  |
Section 5.
Network problems / anomalies detected |
| |
|  |
Section 6.
Wireless penetration testing procedure |
| |
|  |
Section 7.
Final recommendations |
| |  |
Appendix H.
Default SSIDs for Several Common 802.11 Products |
| |  |
Glossary |
| |  | Index |