LEADER 05060nam 2200709 a 450 001 9910457323203321 005 20200520144314.0 010 $a1-62198-900-3 010 $a1-283-30827-4 010 $a9786613308276 010 $a1-84951-559-X 035 $a(CKB)2550000000053173 035 $a(EBL)948547 035 $a(OCoLC)797917750 035 $a(SSID)ssj0000644883 035 $a(PQKBManifestationID)11383349 035 $a(PQKBTitleCode)TC0000644883 035 $a(PQKBWorkID)10680017 035 $a(PQKB)10629484 035 $a(MiAaPQ)EBC948547 035 $a(WaSeSS)Ind00022783 035 $a(PPN)228040574 035 $a(Au-PeEL)EBL948547 035 $a(CaPaEBR)ebr10500143 035 $a(CaONFJC)MIL330827 035 $a(EXLCZ)992550000000053173 100 $a20111014d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBackTrack 5 wireless penetration testing$b[electronic resource] $ebeginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /$fVivek Ramachandran 210 $aBirmingham [U.K.] $cPackt Pub. Ltd.$d2011 215 $a1 online resource (220 p.) 300 $a"Learn by doing: less theory, more results"--Cover. 300 $aIncludes index. 311 $a1-84951-558-1 320 $aIncludes index. 327 $aCover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Wireless Lab Setup; Hardware requirements; Software requirements; Installing BackTrack; Time for action - installing BackTrack; Setting up the access point; Time for action - configuring the access point; Setting up the wireless card; Time for action - configuring your wireless card; Connecting to the access point; Time for action - configuring your wireless card; Summary; Chapter 2:WLAN and ItsInherent Insecurities; Revisiting WLAN frames 327 $aTime for action - creating a monitor mode interfaceTime for action - sniffing wireless packets; Time for action - viewing Management, Control, And Data frames; Time for action - sniffing data packets for our network; Time for action - packet injection; Important note on WLAN sniffing and injection; Time for action - experimenting with your Alfa card; Role of regulatory domains in wireless; Time for action - experimenting with your Alfa card; Summary; Chapter 3:Bypassing WLAN Authentication; Hidden SSIDs; Time for action - uncovering hidden SSIDs; MAC filters 327 $aTime for action - beating MAC filtersOpen Authentication; Time for action - bypassing Open Authentication; Shared Key Authentication; Time for action - bypassing Shared Authentication; Summary; Chapter 4:WLAN Encryption Flaws; WLAN encryption; WEP encryption; Time for action - cracking WEP; WPA/WPA2; Time for action - cracking WPA-PSK weak passphrase; Speeding up WPA/WPA2 PSK cracking; Time for action - speeding up the cracking process; Decrypting WEP and WPA packets; Time for action - decrypting WEP and WPA packets; Connecting to WEP and WPA networks 327 $aTime for action - connecting to a WEP networkTime for action - connecting to a WPA network; Summary; Chapter 5:Attacks on the WLANInfrastructure; Default accounts and credentials on the access point; Time for action - cracking default accounts on the access; points; Denial of service attacks; Time for action - De-Authentication DoS attack; Evil twin and access point MAC spoofing; Time for action - evil twin with MAC spoofing; Rogue access point; Time for action - Rogue access point; Summary; Chapter 6:Attacking the Client; Honeypot and Mis-Association attacks 327 $aTime for action - orchestrating a Mis-Association attackCaffe Latte attack; Time for action - conducting the Caffe Latte attack; De-Authentication and Dis-Association Attacks; Time for action - De-Authenticating the client; Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7:Advanced WLAN Attacks; Man-in-the-Middle attack; Time for action - Man-in-the-Middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session Hijacking over wireless 327 $aTime for action - Session hijacking over wireless 330 $aMaster bleeding edge wireless testing techniques with BackTrack 5. 606 $aComputers$xAccess control 606 $aPenetration testing (Computer security) 606 $aComputer networks$xSecurity measures$xTesting 608 $aElectronic books. 615 0$aComputers$xAccess control. 615 0$aPenetration testing (Computer security) 615 0$aComputer networks$xSecurity measures$xTesting. 676 $a005.8 700 $aRamachandran$b Vivek$0883856 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910457323203321 996 $aBackTrack 5 wireless penetration testing$91994723 997 $aUNINA LEADER 01102nam a22002651i 4500 001 991002273939707536 005 20040226100659.0 008 040407s2003 uika||||||||||||||||eng 035 $ab12897590-39ule_inst 035 $aARCHE-087721$9ExL 040 $aDip.to Filologia Class. e Scienze Filosofiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a301 245 00$aPoetry, theory, praxis :$bthe social life of myth, word and image in ancient Greece : essays in honour of William J. Slater /$cedited by Eric Csapo and Margaret C. Miller 260 $aOxford :$bOxbow,$c2003 300 $aXIV, 266 p. :$bill. ;$c25 cm 600 14$aSlater, William J. 650 4$aLetteratura e società$zGrecia antica 700 1 $aCsapo, Eric 700 1 $aMiller, Margaret C. 907 $a.b12897590$b02-04-14$c16-04-04 912 $a991002273939707536 945 $aLE007 301 CSA 01.01$g1$i2007000067031$lle007$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13462453$z16-04-04 996 $aPoetry, theory, praxis$9305099 997 $aUNISALENTO 998 $ale007$b16-04-04$cm$da $e-$feng$guik$h0$i1 LEADER 01561oam 2200445 450 001 9910702525903321 005 20140902094035.0 035 $a(CKB)5470000002428922 035 $a(OCoLC)608526339 035 $a(EXLCZ)995470000002428922 100 $a20100422d1991 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aExpert systems technology and its implication for archives /$fAvra Michelson 210 1$a[Washington, D.C.] :$cNational Archives and Records Administration,$d1991. 215 $a1 online resource (iv, 41 pages) $cillustrations 225 1 $aNational Archives technical information paper ;$vno. 9 300 $aTitle from title screen (viewed Sept. 2, 2014). 300 $a"March 1991." 320 $aIncludes bibliographical references (pages 35-41). 606 $aArchives$xData processing 606 $aExpert systems (Computer science)$zUnited States 606 $aPublic records$zUnited States$xManagement 615 0$aArchives$xData processing. 615 0$aExpert systems (Computer science) 615 0$aPublic records$xManagement. 700 $aMichelson$b Avra$01422811 712 02$aUnited States.$bNational Archives and Records Administration, 801 0$bOCLCE 801 1$bOCLCE 801 2$bOCLCQ 801 2$bOCLCF 801 2$bGPO 906 $aBOOK 912 $a9910702525903321 996 $aExpert systems technology and its implication for archives$93548354 997 $aUNINA