Index
A
- access point discovery
- Kismet, using for / Using Kismet for access point discovery
- Advanced Encryption Standard / Configuring encryption
- airmon-ng tool / Exploring devices
- airodump-ng mon0 command / Cracking WEP and WPA
- airodump-ng tool
- Alpha AWUS036H
- apt-get update command / Updating BackTrack
- attacks
- performing, WEP used / Performing an attack using WEP and ChopChop
- performing, ChopChop used / Performing an attack using WEP and ChopChop
B
- BackTrack
- downloading / Downloading and configuring BackTrack
- configuring / Downloading and configuring BackTrack
- installing / Installing BackTrack
- updating / Updating BackTrack
- installing, to hard disk / Creating a virtual machine
- BananaVPN / Settings that provide protection from masquerade and rogue AP attacks
C
- ChopChop
- used. for performing attacks / Performing an attack using WEP and ChopChop
D
- Denial of Service (DoS) attack
- about / Different types of attacks
- devices
- exploring / Exploring devices
E
- encryption
- configuring / Configuring encryption
- ESSID (Extended Service Set Identification) / Configuring the wireless card
F
- Federal Communications Commission (FCC) / Detecting the wireless card using iwconfig
G
- Gerix Wifi Cracker
- about / Cracking WEP and WPA
- Global Positioning System (GPS) / Working with tools
- Gnome
- customizing / Customizing Gnome
H
- hidden access points
- discovering / Discovering hidden access points
- Hyper-V
- URL / Installing BackTrack
I
- ifconfig command / Installing BackTrack
- installation, BackTrack / Installing BackTrack
- interfaces
- validating / Validating the interfaces
- iwconfig tool
- used, for detecting wireless card / Detecting the wireless card using iwconfig
K
- Kismet
- about / Using Kismet for access point discovery, Different types of attacks
- using, for access point directory / Using Kismet for access point discovery
M
- masquerading attack
- about / Different types of attacks
N
- NetStumbler
- about / Different types of attacks
- URL / Different types of attacks
- network card
- protocol, analyzing with / Protocol analysis with the network card
O
- OpenVPN product / Settings that provide protection from masquerade and rogue AP attacks
P
- probing and discovery attacks
- about / Different types of attacks
- protocol
- analyzing, with network card / Protocol analysis with the network card
- proXPN product / Settings that provide protection from masquerade and rogue AP attacks
R
- RC4 algorithm / Cracking WEP and WPA
- rogue access point attack
- about / Different types of attacks
S
- settings
- for protection from masquerade and rogue AP attacks / Settings that provide protection from masquerade and rogue AP attacks
- SSID
- about / Working with tools
- ssidsniff tool
- surveillance attack
- about / Different types of attacks
- surveillance attacks
- defending from / Defending from surveillance
T
- tools
- working with / Working with tools
V
- VirtualBox
- URL / Installing BackTrack
- virtual machine
- creating / Creating a virtual machine
- Virtual Private Network (VPN) / Settings that provide protection from masquerade and rogue AP attacks
- VMware Player / Installing BackTrack
- VMware software / Installing BackTrack
- VMware Workstation / Installing BackTrack
W
- WEP
- cracking / Cracking WEP and WPA
- used. for performing attacks / Performing an attack using WEP and ChopChop
- Wi-Fire
- Wicd Network Manager / Exploring devices
- Wired Equivalent Privacy (WEP) algorithm / Protocol analysis with the network card
- wireless attacks
- types / Different types of attacks
- wireless attacks, types
- probing and discovery attacks / Different types of attacks
- surveillance / Different types of attacks
- Denial of Service (DoS) / Different types of attacks
- masquerading / Different types of attacks
- rogue access point / Different types of attacks
- wireless card
- compatibility, verifying / Checking card compatibility
- detecting, during boot process / Detecting the wireless card during the boot process
- detecting, iwconfig tool used / Detecting the wireless card using iwconfig
- configuring / Configuring the wireless card
- modes / Wireless card modes
- wireless security
- configuring / Configuring initial wireless security
- Wireshark
- Wireshark tool
- about / Discovering hidden access points
- WPA
- cracking / Cracking WEP and WPA
- WPA2 / Exploring devices
X
- Xen
- URL / Installing BackTrack