MAC spoofing MITM attacks,
271
Apple Mac OS X Bluetooth Directory Traversal Vulnerability,
304
MacStumbler active scanner,
159-160
madwifi-old (v. 2006-01-24 cvs) driver
installing for injection support with LORCON,
110-116
man-in-the-middle (MITM),
217,
271
MD5, passphrase-to-WEP-key algorithm,
179
Media Access Control (MAC),
55-61
Distributed Coordination Function,
55-56
limitations of MAC filtering,
227
MITM spoofing attacks,
217,
271
Point Coordination Function (PCF),
56
RTS/CTS packets and hidden node problem,
58-61
Message Integrity Check (MIC),
227
802.11i confidentiality and,
84
802.11i integrity and,
87-88
802.11i protection limitations of,
88
Message Integrity Code (MIC),
206
MIC (Message Integrity Code),
206
Microsoft
Microsoft Point-to-Point Encryption,
222,
233
MIMO (Multiple Input Multiple Output),
49-50
MITM (man-in-the-middle),
217,
271
analog modulation techniques,
25-26
More Data and Fragments fields,
65
MPPE (Microsoft Point-to-Point Encryption)
MS-CHAPv2 challenge-response protocol,
214
Multiple Input Multiple Output (MIMO),
49-50
multiple recipients, DCF and,
56