Previous Page
Next Page

Index

B

bandwidth, 18-19
baseband, 24
baseband signals, 15, 25, 27
base-station antennas, 119
Basic Service Set ID (SDDID), 63-64
beacon packets, 66-67, 162
beacons, disabling, 97
billing attacks on hotspots, 272-273
billing portals, 268-269
binary phase shift keying (BPSK), 28
binary planting tool, 328
Bittau, Andrea, 187
Black Alchemy, 198
blued.plist files, 314
Bluesnarfing, 8
Bluetooth
autorooting of, 326-329
Blue-driving equipment, creating, 292-301
countermeasures to Bluetooth attacks, 330
defined, 288
File Transfer Profiles, 325
functionality profiles, 289
InqTana worm and, 306-316
range of, 288-289
scanning and enumerating, 301-306
security problems with, 289-292
sniffer, 291
Special Interest Group, 7
spoofing Bluetooth devices, 316-326
uses of, 6-7
wireless standard, 32
bluez-utils-2.23, 295
BOOTP/DHCP protocols, 339
BPP (Basic Printing Profile), 289
BPSK (binary phase shift keying), 28
breaking
WPA/802.11i, 204-212
WPA hardware-accelerated cracking, 210-211
broadcast probe requests, 92, 94
broadcast SSID, 227
Broadcom
802.11g chipset, 102-103
Windows driver, 353
brute-forcing
40-bit keys created with Neesus Datagram algorithm, 179
basics of, 174
countermeasures for brute-forcing WEP keys, 177
on Linux and OS X, 174-175
on Windows machines, 177
Burgess, James, 289
business impacts of wireless threats, 9

Previous Page
Next Page