Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Main Page Table of content Copyright Praise for 'Real 802.11 Security: Wi-Fi Protected Access and 802.11i' Preface
Why This Book Now? Audience Organization Disclaimer
Acknowledgments Part I: What Everyone Should Know
Chapter 1. Introduction
Setting the Scene Roadmap to the Book Notes on the Book
Chapter 2. Security Principles
What Is Security? Good Security Thinking Security Terms Summary
Chapter 3. Why Is Wi-Fi Vulnerable to Attack?
Changing the Security Model What Are the Enemies Like? Traditional Security Architecture Danger of Passive Monitoring Summary
Chapter 4. Different Types of Attack
Classification of Attacks Attacks Without Keys Attacks on the Keys Summary
Part II: The Design of Wi-Fi Security
Chapter 5. IEEE 802.11 Protocol Primer
Layers Wireless LAN Organization Basics of Operation in Infrastructure Mode Protocol Details Radio Bits Summary
Chapter 6. How IEEE 802.11 WEP Works and Why It Doesn't
Introduction Authentication Privacy Mechanics of WEP Why WEP Is Not Secure Summary
Chapter 7. WPA, RSN, and IEEE 802.11i
Relationship Between Wi-Fi and IEEE 802.11 What Is IEEE 802.11i? What Is WPA? Differences Between RSN and WPA Security Context Keys Security Layers Relationship of the Standards Summary
Chapter 8. Access Control: IEEE 802.1X, EAP, and RADIUS
Importance of Access Control Authentication for Dial-in Users IEEE 802.1X EAP Principles EAPOL Messages Used in IEEE 802.1X Implementation Considerations RADIUS—Remote Access Dial-In User Service Summary
Chapter 9. Upper-Layer Authentication
Introduction Who Decides Which Authentication Method to Use? Use of Keys in Upper-Layer Authentication A Detailed Look at Upper-Level Authentication Methods Transport Layer Security (TLS) Kerberos Cisco Light EAP (LEAP) Protected EAP Protocol (PEAP) Authentication in the Cellular Phone World: EAP-SIM Summary
Chapter 10. WPA and RSN Key Hierarchy
Pairwise and Group Keys Pairwise Key Hierarchy Group Key Hierarchy Key Hierarchy Using AES–CCMP Mixed Environments Summary of Key Hierarchies Details of Key Derivation for WPA Nonce Selection Computing the Temporal Keys Summary
Chapter 11. TKIP
What Is TKIP and Why Was It Created? TKIP Overview Per-Packet Key Mixing TKIP Implementation Details Message Integrity—Michael Per-Packet Key Mixing Summary
Chapter 12. AES–CCMP
Introduction Why AES? AES Overview How CCMP Is Used in RSN Summary
Chapter 13. Wi-Fi LAN Coordination: ESS and IBSS
Network Coordination WPA/RSN Information Element Preauthentication Using IEEE 802.1X IBSS Ad-Hoc Networks Summary
Part III: Wi-Fi Security in the Real World
Chapter 14. Public Wireless Hotspots
Development of Hotspots Security Issues in Public Hotspots How Hotspots Are Organized Different Types of Hotspots How to Protect Yourself When Using a Hotspot Summary
Chapter 15. Known Attacks: Technical Review
Review of Basic Security Mechanisms Review of Previous IEEE 802.11 Security Mechanisms Attacks Against the Previous IEEE 802.11 Security Mechanisms Man-in-the-Middle Attacks Problems Created by Man-in-the-Middle Attacks Denial-of-Service Attacks Summary
Chapter 16. Actual Attack Tools
Attacker Goals Process Example Scenarios Other Tools of Interest Summary
Chapter 17. Open Source Implementation Example
General Architecture Design Guidelines Protecting a Deployed Network Planning to Deploy a WPA Network Deploying the Infrastructure Practical Example Based on Open Source Projects Summary Acknowledgments References and More Information
Appendixes
Appendix A. Overview of the AES Block Cipher
Finite Field Arithmetic Steps in the AES Encryption Process
Appendix B. Example Message Modification
Example Message Modification
Appendix C. Verifying the Integrity of Downloaded Files
Checking the MD5 Digest Checking the GPG Signature
Acronyms References
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion