Seven Deadliest Wireless Technologies Attacks, Syngress

7 D.W.T.A

The Seven Deadliest Attacks Series

Brad Haines


E-books Shop
Seven Deadliest Wireless Technologies Attacks

Acknowledgments
I would like to acknowledge all the people who have helped me over the years to gain
my knowledge of wireless and provided me with a fun and interesting hobby and
career and the opportunity to share that knowledge with others.
• Mike Kershaw (Dragorn) for putting up with my constant feature requests and
bug reports for Kismet and for making his wonderful tool free to the world.
• Frank Thornton (Thorn) for providing mentorship and camaraderie at many a convention
and for helping design some great wireless contests to hone my skills.
• Chris Hurley (Roamer) for many of the wireless contests and for years of direct
and honest opinions and comments on everything wireless.
• Josh Wright for his wonderful work on coWPAtty and the WPA cracking tables
and for many other tools used by thousands of people on a daily basis.
• Emmanual Goldstein, 2600 magazine, and the HOPE organizers for another wonderful
conference full of new ideas and experiences and giving me the opportunity to meet my wife.
• Jeff Moss (Dark Tangent) and the DEFCON staff for continually putting on a
wonderful conference and providing a great environment to learn and explore new things and ideas.
• The DEFCON and Netstumbler forum regulars who have provided years of
insight, tutelage, and, at times, questionable encouragement in my research.
• The “Church of WiFi” members for helping on so many projects and for keeping wireless sexy.
• Jesse Burns, Simple Nomad, Adam Laurie, Zac Franken, 
and all the others who have helped over the years.
• Finally, and most importantly, my wife Dianna (Grey Frequency) for always
being there for me no matter how weird, outlandish, or crazy the project and for
being a voice of reason when I need it.

About the Authors
Brad “RenderMan” Haines Contributing Author to RFID Security (ISBN: 978-1-
59749-047-4, Syngress) and Kismet Hacking (ISBN: 978-1-59749-117-4, Syngress),
is chief researcher of Renderlab.net and co-refounder of “The Church of WiFi” wireless
thinktank. He currently operates his own consulting company in Edmonton,
Alberta, Canada, providing wireless performance and security assessment services to a variety of clients both large and small.
A noted expert in the hacker community in the field of wireless security, he has
spoken at many international conferences such as Black Hat and DEFCON and
taught several classes on free wireless assessment tools. He has also contributed
over time to many wireless security tools such as the Kismet wireless sniffer and
coWPAtty.

Technical Editor
Tim Kramer (CISSP, CEH, GSEC, GCIH, NSA IAM/IEM) recently served as subject
matter expert (SME) for Information Assurance (IA), Unix systems, and wireless
technologies for Honeywell Technology Solutions and General Dynamics. Currently,
he is providing IA and Unix support for various organizations in Portsmouth, Virginia.
Tim’s background includes positions such as vulnerability analyst at NETWARCOM
(Naval Network Warfare Command) and roles such as the Navy’s wireless SME, coauthor
of Navy and Joint Forces wireless policies, and IA review of one of Electronic
Data System’s wireless solutions.

Contents
About the Authors
Introduction
Chapter 1 802.11 Wireless – Infrastructure Attacks
How Wireless Networks Work.........................................................3
Case Study: TJX Corporation..........................................................5
Understanding WEP Cracking.........................................................7
How to Crack WEP..........................................................................8
It Gets Better and Worse................................................................13
WPA and WPA2 in a Nutshell.......................................................15
How to Crack WPA PSK and WPA2 PSK.....................................19
Summary........................................................................................24
Endnotes.........................................................................................24
Chapter 2 Wireless – Client Attacks
Public Hotspot Dangers.................................................................26
How Hotspots Work.......................................................................26
Attacking Public Hotspots.............................................................27
The Crux of the Problem................................................................33
Solutions.........................................................................................33
Injection Attacks............................................................................34
Replacing Java Script................................................................38
Summary........................................................................................40
Endnote..........................................................................................41
Chapter 3 Bluetooth Attacks
Bluetooth Technology....................................................................44
Hacking Bluetooth.........................................................................46
Bluetooth Discovery..................................................................46
Connecting.....................................................................................48
Carwhisperer.............................................................................49
Bluebug.....................................................................................50
Wholesale Sniffing.........................................................................52
Bluetooth Viruses...........................................................................54
Summary........................................................................................55
Chapter 4 Radio Frequency Identification Attacks
RFID Basics...................................................................................58
RFID Systems...........................................................................58
RFID Risks.....................................................................................60
Physical Access Control.................................................................61
Proximity Cards.........................................................................63
Cloning RFID............................................................................66
Minimizing the Risk..................................................................68
RFID Meets Crypto........................................................................69
Summary........................................................................................73
Endnotes.........................................................................................73
Chapter 5 Analog Wireless Devices
Analog Devices..............................................................................76
Digital versus Analog.....................................................................77
Analog Security.........................................................................77
Digital Security.........................................................................78
Cordless and Wireless....................................................................78
Exploiting Analog Wireless...........................................................78
Audio Vulnerabilities................................................................79
Scanner Selection...........................................................................80
Headsets....................................................................................82
Wireless Microphones....................................................................82
Video Devices................................................................................84
Defense...........................................................................................85
Summary........................................................................................87
Chapter 6 Bad Encryption
History............................................................................................90
Proper Encryption..........................................................................91
Passports.........................................................................................92
Passport Summary..........................................................................96
Speedpass.......................................................................................97
Advanced WPA and WPA2 Cracking..........................................100
Summary......................................................................................101
Endnote........................................................................................102
Chapter 7 Cell Phones, Personal Digital Assistants, and Other Hybrid Devices
Hybrid Devices.............................................................................103
History..........................................................................................104
Anatomy of the Attack.................................................................105
Jailbreaking.............................................................................106
The Attacks..................................................................................112
Future Attacks..............................................................................113
Offensive Uses of Hybrid Devices..........................................114
Anonymity...............................................................................116
iPhone Summary..........................................................................116
Android Security.....................................................................117
Common Threats.....................................................................118
Summary......................................................................................119
Index........................................................................................................... 121


 Screenshot 
E-books Shop


Purchase Now !
Just with Paypal



Product details
 Price
 File Size
 1,740 KB
 Pages
 139 p
 File Type
 PDF format
 ISBN
 978-1-59749-541-7
 Copyright
 2010 Elsevier Inc.                  
●▬▬▬▬▬❂❂❂▬▬▬▬▬●
●▬▬❂❂▬▬●
●▬❂▬●


═════ ═════

Previous Post Next Post