WarDriving Display (AiroPeek),
141-144
websites for downloading
plug-in used for mapping,
158
websites for further information
AiroPeek driver installation,
140
device driver version resolution code,
358
D-Link Pocket Access point,
286
Google maps, using with Kismet,
286
NTIA Office of Spectrum Management,
43
tools in Bluetooth example,
330
statistical attacks against,
344-347
basics of brute-forcing,
174
brute-forcing 40-bit keys created with Neesus Datagram algorithm,
179
countermeasures for brute-forcing WEP keys,
177
defending against statistical attacks,
183-184
dictionary attacks against algorithms,
179-180
dictionary attacks against WEP,
177-179
hardware-accelerated WEP cracking,
175-176
Linux and OS X brute-forcing,
174-175
Neesus Datacom passphrase algorithm vulnerabilities,
178
Playstation 3 to crack WEP keys,
177
preventing Neesus Datacom and generic dictionary attacks,
180
statistical attacks against WEP,
180
Windows brute-forcing,
177
weplab, dictionary attacks and,
180
WiFiME rt2560 custom driver,
116-117
wigle.net (Wireless Geographic Logging Engine) mapping service,
161
WildPackets
download of AiroPeek and,
140
aircrack to break WEP on,
182
deauthentication attack on,
170
defeating MAC filtering on,
172-173
Wireless Zero Configuration utility,
264,
265
windows/driver/dlink_wifi_rates exploit,
356
Wired Equivalent Privacy (WEP).
See WEP
wireless communications history,
14
Wireless Geographic Logging Engine (wigle.net) mapping service,
161
CTS attacks with pcap2air,
197
Michael countermeasures attack on,
197-198
RTS attacks with pcap2air,
196
wireless security advances,
10-11
wireless setup case study, 2
Wireless Statistics (WarDriving Display), AiroPeek,
141-144
wireless technologies,
4-12
standardization and regulation of,
6-7
Wireless Zero Configuration service (WZC),
128,
137-140
Wireless Zero Configuration utility,
264,
265
Wireshark
monitoring DHCP traffic with,
340
WiSPY
intrusion detection and,
236
WiSpy tools and frequency analysis,
98
WPA (Wi-Fi Protected Access)
enterprise authentication exchange,
207
hardware-accelerated cracking,
210-211
with TKIP (RC4-based encryption),
229
wpa_supplicant.conf file,
205
decrypting WPA-PSK packet captures,
211-212
preventing WPA-PSK dictionary attacks,
212
WPA/WPA2 in enterprise mode,
206
WPA-PSK
dictionary attacks, preventing,
212
packet captures, decrypting,
211-212
WZC (Wireless Zero Configuration service),
128,
137-140