Previous Page
Next Page

Index

S

scanners. See also NetStumbler; and specific scanners
AiroPeek, 140-144
defined, 95
iStumbler, 160
Kismac, 154-159
Kismet, 147-153
MacStumbler active, 159-160
Nessus vulnerability scanner, 279-281
Wellenreiter scanner, 144-154
scanning
active, 92-95
Bluetooth, 301-306
hcitool scans, 295, 304
passive, 95-96
ping scans, 278
scapy, 359
SDDID (Basic Service Set ID), 63-64
sdptool, 302-303
SeattleWireless wireless cards list, 104
security, 168-173
advances in wireless, 10-11
avoidance countermeasures for MAC filters, 173
countermeasures for deauthenticating users, 171
deauthenticating users, 169
deauthentication attacks, 169-170
defeating MAC filtering, 171-173
security problems with Bluetooth, 289-292
sensitivity of wireless cards, 105-106
serial numbers added to packets, 88
servers certificate (RADIUS), 238-240
Service Set Identifier (SSID)
broadcast, 227
fields, 67
NetStumbler main window and, 131
security and, 168
unique, 227
setuid binary, 313
SHA-1 algorithm, 211
ShadoMAC, 173
Shamir, Adi, 344
shared key authentication, 184
Shmoo group, Hot Spot Defense Kit, 194
signal envelopes, 26
signal to noise ratio (SNR)
defined, 42
display in NetStumbler, 133-134
signals
AM modulated RF, 26
baseband, 15
baseband audio, 25
baseband input, 27
FM modulated RF, 27
frequency of sinusoidal, 17
line-of-sight, 20
minimizing exposure of, 226-227
radio frequency, 17-19
RF carrier, 24
Single Send-Multiple Response (SSMR), 336-337
sinusoidal tones, 17
sniffers, 95
sniffing
hotspots, 274-275
injected packets, 115-116
S-nonce (authenticator-nonce), four-way handshake and, 83, 85
SNR (signal to noise ratio). See signal to noise ratio
Sorbo, 187
-sP parameter, ping scans, 277
spoofing
ARP-spoofing tools, 285
Bluetooth devices, 316-326
hotspots, 270-271
MAC spoofing MITM, 271
spread spectrum communications, 31-33
SSH port-forwarding option, 272
SSID (Service Set Identifier). See Service Set Identifier
SSL VPNs, 234
SSMR (Single Send-Multiple Response), 336-337
standardization/regulation of wireless technologies, 6-7
static method, 173
statistical attacks
countermeasures, 353
modified, 347-353
against WEP, 180, 183-184, 344-347
stumblers, 95
StumbVerter program
file format for, 134
mapping with, 136-137
online services and, 161
success messages, 71
summary-formatted files, 134
supplicant entries, 70
Symbol Spectrum24 chipsets, 102
symbol-rate, 28
symbols, 26-27

Previous Page
Next Page