Index
A
- access point
- setting up / Setting up the access point
- configuring / Time for action – configuring the access point, What just happened?
- configuring, to use WEP / Have a go hero – configuring the access point to use WEP and WPA
- configuring, to use WPA / Have a go hero – configuring the access point to use WEP and WPA
- connecting to / Connecting to the access point
- connecting to, wireless card used / Time for action – configuring your wireless card, What just happened?
- tables, filling / Have a go hero – filling up the access point's tables
- access points
- default accounts, cracking on / Default accounts and credentials on the access point, Time for action – cracking default accounts on the access points, What just happened?
- accounts
- cracking, Brute-force attacks used / Have a go hero – cracking accounts using brute-force attacks
- adapter
- aircrack-NG suite
- airodump-NG utility
- URL / What just happened?
- AP
- setting up, FreeRADIUS-WPE used / Time for action – setting up the AP with FreeRADIUS-WPE, What just happened?
- AP-less WPA-Personal cracking
- about / AP-less WPA-Personal cracking
- AP-less WPA cracking
- application hijacking
- challenge / Have a go hero – application hijacking challenge
B
- Brute-force attacks
- used, for cracking accounts / Have a go hero – cracking accounts using brute-force attacks
C
- Caffe Latte attack
- about / The Caffe Latte attack
- conducting / Time for action – conducting a Caffe Latte attack, What just happened?
- client
- deauthenticating / Time for action – deauthenticating the client
- security configurations, finding / Finding security configurations on the client
- De-Authentication attack / Time for action – deauthentication attacks on the client
- clients
- baiting / Have a go hero – baiting clients
- control
- control frames
- about / Revisiting WLAN frames
- Cowpatty
- used, for cracking WPA-PSK / Have a go hero – trying WPA-PSK cracking with Cowpatty
D
- data
- collecting / Time for action – collecting data
- data frames
- data packets
- sniffing, for network / Time for action – sniffing data packets for our network
- analyzing / Have a go hero – analyzing data packets
- injecting / Time for action – packet injection
- De-Authentication attack
- deauthentication attack
- default accounts
- cracking, on access points / Default accounts and credentials on the access point, Time for action – cracking default accounts on the access points
- Denial of Service (DoS) attack / Have a go hero – filling up the access point's tables
- Denial of Service (DoS) attacks
- about / Denial of service attacks
- De-Authentication attack / Time for action – deauthentication DoS attacks, What just happened?
- Dis-Association attack / Have a go hero – disassociation attacks
- disassociation attack
- discovery phase, wireless penetration testing / Discovery
E
- EAP-TTLS
- about / EAP-TTLS
- EAPoL Key / Time for action – cracking WPA-PSK weak passphrases
- Enterprises
- security, best practices / Security best practices for Enterprises
- Ettercap / Have a go hero – application hijacking challenge
- evil twin
- about / Evil twin and access point MAC spoofing
- and channel hopping / Have a go hero – evil twins and channel hopping
- evil twin, with MAC spoofing
F
- filters
- playing with / Have a go hero – playing with filters
- FreeRADIUS-WPE
- setting up / Setting up FreeRADIUS-WPE
- URL / Setting up FreeRADIUS-WPE
- used, for setting up AP / Time for action – setting up the AP with FreeRADIUS-WPE, What just happened?
- RADIUS, playing with / Have a go hero – playing with RADIUS
H
- hacker
- Hirte attack
- URL / The Hirte attack
- WEP, cracking with / Time for action – cracking WEP with the Hirte attack, What just happened?
- Honeypot attacks
- Hydra / Have a go hero – cracking accounts using brute-force attacks
K
- Kali
- URL / Software requirements
- installing / Installing Kali, Time for action – installing Kali, What just happened?
- installing, on Virtual Box / Have a go hero – installing Kali on VirtualBox, Have a go hero – installing Kali on VirtualBox
M
- MAC filters
- about / MAC filters
- instructions / Time for action – beating MAC filters, What just happened?
- man-in-the-middle attack
- about / A man-in-the-middle attack, Time for action – man-in-the-middle attack, What just happened?
- over pure wireless / Have a go hero – man-in-the-middle over pure wireless
- used, for Wireless Eavesdropping / Wireless Eavesdropping using MITM, Time for action – Wireless Eavesdropping, What just happened?
- management
- management frames
- about / Revisiting WLAN frames
- Message Integrity Check (MIC) / WPA/WPA2
- Mis-Association attack
- monitor mode interface
- creating / Time for action – creating a monitor mode interface, What just happened?
- multiple monitor mode interfaces, reating / Have a go hero – creating multiple monitor mode interfaces
- MSCHAP-v2 / What just happened?
O
- Open Authentication
- about / Open Authentication
- bypassing / Time for action – bypassing Open Authentication
P
- Pairwise Master Key (PMK) / Speeding up WPA/WPA2 PSK cracking
- Pairwise Transient Key (PTK) / WPA/WPA2
- Password-Based Key Derivation Function (PBKDF2) / WPA/WPA2
- PEAP
- attacking / Attacking PEAP
- versions / Attacking PEAP
- cracking / Time for action – cracking PEAP, What just happened?
- attack, variations / Have a go hero – attack variations on PEAP
- EAP-TTLS / EAP-TTLS
- planning phase, wireless penetration testing / Planning
- Pre-Shared key (PSK) / WPA/WPA2
- Preferred Network List (PNL)
- probe
- sniffing / Probe sniffing
- data, collecting / Time for action – collecting data, What just happened?
- rate, limiting / Have a go hero – extension ideas
- promiscous mode / Revisiting WLAN frames
R
- Radio Frequency (RF) / What just happened?
- RADIUS
- receiving / Pop quiz – attacking WPA-Enterprise and RADIUS
- regulatory domains
- role / The role of regulatory domains in wireless
- adapter, experimenting with / Time for action – experimenting with your adapter
- exploring / Have a go hero – exploring regulatory domains
- reporting phase, wireless penetration testing / Reporting
- rogue access point
- about / A rogue access point
- WEP, cracking / Time for action – cracking WEP, What just happened?
- challenge / Have a go hero – rogue access point challenge
S
- session hijacking
- Shared Key Authentication
- about / Shared Key Authentication
- bypassing / Time for action – bypassing Shared Authentication
- SSIDs
- hidden SSIDs, uncovering / Hidden SSIDs, Time for action – uncovering hidden SSIDs, What just happened?
- deauthentication, selecting / Have a go hero – selecting deauthentication
V
- Virtual Box
- Kali, installing on / Have a go hero – installing Kali on VirtualBox
W
- WEP
- protocol / WEP encryption
- cracking / Time for action – cracking WEP, What just happened?, Time for action – cracking WEP, What just happened?
- cracking, with Hirte attack / Time for action – cracking WEP with the Hirte attack, What just happened?
- WEP configuration
- WEP network
- WEP packets
- Wi-Fi Protection Access v2 (WPAv2) / WLAN encryption
- WiFishing / What just happened?
- wireless card
- setting up / Setting up the wireless card
- configuring / Time for action – configuring your wireless card
- used, for access point connection / Time for action – configuring your wireless card, What just happened?
- Wireless Eavesdropping
- wireless lab
- hardware, requisites / Hardware requirements
- software, requisites / Software requirements
- wireless packets
- sniffing / Time for action – sniffing wireless packets
- wireless penetration testing
- about / Wireless penetration testing
- planning phase / Planning
- discovery phase / Discovery
- attacking phase / Attack, Attacking infrastructure
- reporting phase / Reporting
- wireless penetration testing, attacking phase
- encryption, cracking / Cracking the encryption
- infrastructure, cracking / Attacking infrastructure
- clients, compromising / Compromising clients
- Wireshark traces
- WLAN
- authentication / Pop quiz – WLAN authentication
- encryption, flaws / Pop quiz – WLAN encryption flaws
- WLAN access points
- WLAN attacks / Pop quiz – advanced WLAN attacks
- WLAN encryption
- about / WLAN encryption
- WLAN frames
- about / Revisiting WLAN frames
- management frames / Revisiting WLAN frames
- control frames / Revisiting WLAN frames
- data frames / Revisiting WLAN frames
- WLAN Packet Sniffing
- and Injection / Pop quiz – WLAN packet sniffing and injection
- WLAN Sniffing
- WPA
- about / WPA/WPA2
- WPA-Enterprise
- receiving / Pop quiz – attacking WPA-Enterprise and RADIUS
- WPA-PSK
- weak passphrase, cracking / Time for action – cracking WPA-PSK weak passphrases
- cracking, Cowpatty used / Have a go hero – trying WPA-PSK cracking with Cowpatty
- WPA/WPA2 PSK
- cracking, speeding up / Speeding up WPA/WPA2 PSK cracking, Time for action – speeding up the cracking process
- WPA2
- about / WPA/WPA2
- WPA network
- WPA packets
- WPS
- attacks / WPS attacks, Time for action – WPS attack
- rate, limiting / Have a go hero – rate limiting