Previous Page
Next Page

Index

D

DACs (digital-to-analog converters), 26
data
encryption of, 8
interception of, 7-8
saving in Kismac, 158-159
saving in NetStumbler, 134
Data Encryption Standard (DES) encryptions, 214
data packets, 63, 163
data rates/modulations, 802.11b, 48
DCF (Distributed Coordination Function) in MAC, 55-56
dd-wrt micro, 193
deauthentication
attacks on Linux, 169-170
attacks on OS X, 170
attacks on Windows, 170
countermeasures for user, 171
of users, 169
decibels, 21-23
Decode TCP Stream feature in Wireshark, 275
decrypting
packet captures with airdecap, 211-212
WPA-PSK packet captures, 211-212
defenses of 802.11 configurations, 226-236, 240-253. See also FreeRADIUS configurations
avoiding layer 2 security, 231-235
deploying WPA/WPA2 securely, 229-231
FreeRADIUS configurations, 236, 240-244
intrusion detection, 235-236
minimizing signal exposure, 226-227
OS X client configuration, 249-250
PEAP configuration on wireless connections, 246-249
PEAP authentication for Linux, 250-251
RADIUS configuration problems, 251-252
securing WEP, 227-229
DES (Data Encryption Standard) encryptions, 214
device drivers, 353-360
countermeasures and, 357-358
fingerprinting, 358
fuzzing wireless, 358-360
Metasploit 3.0 and, 354-357
overview of, 353-354
updating, 357-358
DHCP (Dynamic Host Configuration Protocol) traffic, 163
DHCP/BOOTP protocols, 339
dialup authentication with EAP, 70
Dialup Networking Profiles, 323
dictionary attacks against 104-bit keys created with Neesus Datagram algorithm, 179
against WEP, 8, 177-178
preventing generic, 180
preventing WPA-PSK, 212
differential PSK (DPSK), 30
Diffie-Hellman parameter files, 240
digital modulations, 26-31
basics of, 26-28
complementary code keying, 30
phase shift keying, 28-30
quadrature amplitude modulation, 30-31
Digital Signal Processors (DSPs), 24, 26
digital-to-analog converters (DACs), 26
dipole antennas, 40
Direct Sequence Spread Spectrum (DSSS), 32
directional antennas, 117
directivity, antenna, 37
discoverable devices, 290
discovery, 92-98
active scanning, 92-95
active scanning countermeasures, 96-97
frequency analysis (below link layer), 98
frequency analysis countermeasures, 98
passive scanning countermeasures, 97
passive scanning (monitor mode), 95-96
discovery tools
Windows. See AiroPeek; NetStumbler
Distributed Coordination Function (DCF) in MAC, 55-56
D-Link DWL-G730AP, 274
dlink_wifi_rates drivers, 357
dongles
class 1, 304
D-Link Bluetooth, 305
modifying Bluetooth, 293
DoS (denial of service) attacks, 285
downconversion process, 15-16
DPSK (differential PSK), 30
dragorn WiSpy tools, 98, 236
driver vulnerabilities. See device drivers
features desired in, 107-108
host-ap (v. 0.3.9), 109
madwifi-old, 109-926
rt2570, 109
Windows', 116-117
dsniff sniffing tool, 275
DSPs (Digital Signal Processors), 24, 26
DSSS (Direct Sequence Spread Spectrum), 32
Dug Song dniff suite, 271, 275
.dump Kismet file, 151
Duration fields, 66
Dynamic Host Configuration Protocol (DHCP) traffic, 163
dynamic WEP keys, 183-184, 228-229

Previous Page
Next Page