19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

xii<br />

Hacking For Dummies, 4th Edition<br />

The MAC-daddy attack ......................................................................146<br />

Testing denial of service attacks .....................................................150<br />

Detecting Common Router, Switch, and Firewall Weaknesses ..............154<br />

Finding unsecured interfaces ...........................................................154<br />

Exploiting IKE weaknesses................................................................154<br />

Putting Up General Network Defenses ......................................................155<br />

Chapter 9: Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157<br />

Understanding the Implications of Wireless Network Vulnerabilities .... 157<br />

Choosing Your Tools ...................................................................................158<br />

Discovering Wireless LANs ........................................................................161<br />

Checking for worldwide recognition ...............................................161<br />

Scanning your local airwaves ...........................................................162<br />

Discovering Wireless Network Attacks and Taking Countermeasures ... 163<br />

Encrypted traffic ................................................................................165<br />

Countermeasures against encrypted traffic attacks .....................170<br />

Wi-Fi Protected Setup ........................................................................170<br />

Countermeasures against the WPS PIN flaw ..................................172<br />

Rogue wireless devices .....................................................................172<br />

Countermeasures against rogue wireless devices ........................176<br />

MAC spoofing .....................................................................................177<br />

Countermeasures against MAC spoofing ........................................181<br />

Physical security problems ..............................................................182<br />

Countermeasures against physical security problems.................182<br />

Vulnerable wireless workstations ...................................................182<br />

Countermeasures against vulnerable wireless workstations ......183<br />

Default configuration settings ..........................................................183<br />

Countermeasures against default<br />

configuration settings exploits .....................................................184<br />

Chapter 10: Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185<br />

Sizing Up Mobile Vulnerabilities ................................................................185<br />

Cracking Laptop Passwords .......................................................................186<br />

Choosing your tools ..........................................................................186<br />

Countermeasures ...............................................................................190<br />

Cracking Phones and Tablets ....................................................................191<br />

Cracking iOS Passwords ...................................................................192<br />

Countermeasures against password cracking ...............................195<br />

Part IV: Hacking Operating Systems .......................... 197<br />

Chapter 11: Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199<br />

Introducing Windows Vulnerabilities .......................................................200<br />

Choosing Tools ............................................................................................201<br />

Free Microsoft tools ..........................................................................201<br />

All-in-one assessment tools ..............................................................202<br />

Task-specific tools .............................................................................202

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!