05060nam 2200709 a 450 991045732320332120200520144314.01-62198-900-31-283-30827-497866133082761-84951-559-X(CKB)2550000000053173(EBL)948547(OCoLC)797917750(SSID)ssj0000644883(PQKBManifestationID)11383349(PQKBTitleCode)TC0000644883(PQKBWorkID)10680017(PQKB)10629484(MiAaPQ)EBC948547(WaSeSS)Ind00022783(PPN)228040574(Au-PeEL)EBL948547(CaPaEBR)ebr10500143(CaONFJC)MIL330827(EXLCZ)99255000000005317320111014d2011 uy 0engur|n|---|||||txtccrBackTrack 5 wireless penetration testing[electronic resource] beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /Vivek RamachandranBirmingham [U.K.] Packt Pub. Ltd.20111 online resource (220 p.)"Learn by doing: less theory, more results"--Cover.Includes index.1-84951-558-1 Includes index.Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Wireless Lab Setup; Hardware requirements; Software requirements; Installing BackTrack; Time for action - installing BackTrack; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2:WLAN and ItsInherent Insecurities; Revisiting WLAN framesTime for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing Management, Control, And Data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your Alfa card; Role of regulatory domains in wireless; Time for action - experimenting with your Alfa card; Summary; Chapter 3:Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filtersTime for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4:WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrase; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networksTime for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5:Attacks on the WLANInfrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access; points; Denial of service attacks; Time for action - De-Authentication DoS attack; Evil twin and access point MAC spoofing; Time for action - evil twin with MAC spoofing; Rogue access point; Time for action - Rogue access point; Summary; Chapter 6:Attacking the Client; Honeypot and Mis-Association attacksTime for action - orchestrating a Mis-Association attackCaffe Latte attack; Time for action - conducting the Caffe Latte attack; De-Authentication and Dis-Association Attacks; Time for action - De-Authenticating the client; Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7:Advanced WLAN Attacks; Man-in-the-Middle attack; Time for action - Man-in-the-Middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session Hijacking over wirelessTime for action - Session hijacking over wirelessMaster bleeding edge wireless testing techniques with BackTrack 5.ComputersAccess controlPenetration testing (Computer security)Computer networksSecurity measuresTestingElectronic books.ComputersAccess control.Penetration testing (Computer security)Computer networksSecurity measuresTesting.005.8Ramachandran Vivek883856MiAaPQMiAaPQMiAaPQBOOK9910457323203321BackTrack 5 wireless penetration testing1994723UNINA00897nam a22002411i 450099100176845970753620031211093417.0040407s1974 uika||||||||||||||||eng b12820532-39ule_instARCHE-080015ExLDip.to Scienze StoricheitaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.301.31Simmons, Ian Gordon129700The ecology of natural resources /I.G. SimmonsLondon :Edward Arnold,1974VII, 424 p. :ill. ;24 cmAmbiente naturale.b1282053202-04-1416-04-04991001768459707536LE009 GEOG.09-8312009000184473le009-E0.00-l- 00000.i1337059516-04-04Ecology of natural resources299645UNISALENTOle00916-04-04ma -enguik4101423nam0 22003131i 450 UON0041113420231205104741.1881965-452120120925d2010 |0itac50 baspaES|||| |||||Historiografia de los aspectos funerarios de Augusta Emerita (Siglo I-IV)José Maria Murciano CallesMeridaMuseo Nacional de Arte Romano2010245 p.ill.21 cmMuseo Nacional de Arte RomanoIT-UONSI N 3MERIDA007001UON000874842001 Cuadernos Emeritenses36SITI ARCHEOLOGICIMerida (Spagna)UONC063613FIESMéridaUONL002380936.6STORIA DELL'ANTICA PENISOLA IBERICA E ISOLE ADIACENTI FINO AL 41521MURCIANO CALLESJosé MariaUONV210351Museo Nacional de Arte RomanoMeridaUONV058061696625Museo Nacional de Arte RomanoUONV259708650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00411134SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI N 3 MERIDA 007 SI 1785 5 Museo Nacional de Arte RomanoHistoriografia de los aspectos funerarios de Augusta Emerita (Siglo I-IV1341039UNIOR