CEH
What Is a Wireless Network? 359 Cracking WPA To crack WPA you must use a different approach than you would with WEP. Fortunately ...
360 Chapter 15 ■ Wireless Networking Brute-Force WPA Keys The old standby in a number of cases, including the breaking of WPA/WP ...
What Is a Wireless Network? 361 What makes this type of attack possible is that wireless detection software will either listen f ...
362 Chapter 15 ■ Wireless Networking MAC Spoofing For those access points that employ MAC filtering, you can use MAC spoofing. M ...
What Is a Wireless Network? 363 Misconfiguration We have pointed out this problem before in other areas, and misconfiguration is ...
364 Chapter 15 ■ Wireless Networking One hardware device that is designed to use as a wireless honeyspot is the WiFi Pineapple f ...
What Is a Wireless Network? 365 Also note that in addition to traffic analysis some tools offer the ability to perform spectrum ...
366 Chapter 15 ■ Wireless Networking used to connect devices such as headsets, media players, and other types of technologies. B ...
Summary 367 ■ An attacker can remotely control a phone to make phone calls or connect to the Internet. ■ Attackers have been kno ...
368 Chapter 15 ■ Wireless Networking software can easily use a wireless network to break into and take over a network or at the ...
Review Questions 369 Review Questions WEP is designed to offer security comparable to which of the following? A. Bluetooth B. ...
370 Chapter 15 ■ Wireless Networking When a wireless client is attached to an access point, it is known as which of the followi ...
Review Questions 371 Bluejacking is a means of which of the following? A. Tracking a device B. Breaking into a device C. Sendi ...
...
Evading IDSs, Firewalls, and Honeypots CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER: ✓ III. Security ■ Vulnerabilities ✓ IV. Tool ...
At this point in this book you have seen quite a number of ways to break into a computer system, network, or organization. The p ...
Honeypots, IDSs, and Firewalls 375 A network IDS (NIDS) is a packet sniffer at its very core. The difference between a packet sn ...
376 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots An IDS functions in the following way: The IDS monitors network activit ...
Honeypots, IDSs, and Firewalls 377 Signature-based IDSs also have another potential drawback: the fact that the signature files ...
378 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots Host System Intrusions What is an indicator of an attack on a host? A wi ...
«
16
17
18
19
20
21
22
23
24
25
»
Free download pdf