Airscanner Mobile Sniffer Bedienungsanleitung Seite 10

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 16
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 9
356
Hacking Wireless Networks For Dummies
MAC-address spoofing (continued)
in Linux, 198–199
MAC address vendor IDs online, 198
SMAC MAC address changer for, 203–204
spoofing defined, 197
testing MAC address controls, 204–207
in Windows, 199–203
MacStumbler wardriving software, 174
management-frame attacks, 209–211
man-in-the-middle attacks. See MITM attacks
mapping null sessions (Windows), 106–107
mapping your network, 35–37, 340
MapPoint software (Microsoft), 62–63,
149–150, 167
media-access control addresses. See MAC
addresses
Meetinghouse Data
AEGIS 802.1X client software, 289
AEGIS RADIUS server, 289
message authentication code (MAC), 257
methodology implementation. See
implementing a testing methodology
Microsoft. See also Windows
IAS, 288
MapPoint software, 62, 63, 149–150, 167
PPTP protocol, 279–280
Streets & Trips, 63, 150
Virtual PC, 47
MIDI (Musical Instrument Digital Interface),
140, 170
Milner, Marius (wardriver), 169
MiniStumbler wardriving tool, 170–173
MIPS PDA (Casio), 44
mistakes to avoid
breaking the law, 316–319
failing to equip yourself, 313–314
failing to get written permission, 312–313
failing to report results or follow up,
314–316
forgetting to unbind the NIC when
wardriving, 309–312
not involving others in testing, 308
not using a methodology, 308–309
over-penetrating live networks, 314
skipping planning, 307–308
using data improperly, 314
MITM (man-in-the-middle) attacks
ARP poisoning, 209
dangers of, 208–209
defined, 208
management-frame attacks, 209–211
methods for, 209
port stealing, 209
tools for, 209
Mognet sniffer, 119, 174
monitoring laws, 317–318
monkey-in-the-middle attacks. See MITM
(man-in-the-middle) attacks
monkey_jack MITM attack utility, 208,
210–211
multi-boot workstations, 45–46
Musical Instrument Digital Interface (MIDI),
140, 170
• N •
National Marine Electronics Association
(NMEA) GPS protocol, 62
Nessus vulnerability assessment tool, 40,
103–104
NetChaser wardriving software, 174
NetStumbler (Network Stumbler) tool. See
also wardriving
active scanning method of, 132
DiGLE with, 151–152
Display options, 138
downloading, 133
enumeration with, 37
example window from session, 133–135
exporting plotted data from, 148
filters, 146–147
finding unauthorized equipment with,
186–188
flags, 144
General options, 137
GPS options, 138–139
GPS units and, 62–63
Hermes chipset and, 57
information recorded by, 132
installing, 133
interpreting results, 141–148
MAC addresses in, 144, 145
mapping data from, 149–152
menus and commands, 135–136
merging files, 147
Microsoft Streets & Trips with, 150
MIDI options, 140
need for, 56
network mapping with, 35–36
RF jamming displayed in, 230–232
right-pane columns described, 142–143
running, 133
scan speed settings, 137
30_597302_bindex.qxd 8/4/05 7:27 PM Page 356
Seitenansicht 9
1 2 ... 5 6 7 8 9 10 11 12 13 14 15 16

Kommentare zu diesen Handbüchern

Keine Kommentare