
Part0:幼稚园篇卷1 无线基础知识扫盲...........................................71.1 什么是无线网络.........................................71.1.1 狭义无线网络....................................71.1.2 广义无线网络....................................91.2 蓬勃发展的无线城市....................................111.3 无线安全及Hacking技术的发展..........................12卷2 常见无线网络设备..........................................152.1 认识无线路由器........................................152.2 了解无线网卡..........................................162.3 走近天线..............................................172.4 其它..................................................18卷3 搭建自己的无线网络........................................193.1 WEP基础..............................................193.1.1 关于WEP......................................193.1.2 WEP及其漏洞..................................203.1.3 WEP的改进....................................203.2 WEP加密设置和连接....................................213.2.1 配置无线路由器.................................213.2.2 Windows下客户端设置...........................223.2.3 Linux下客户端设置..............................233.3 WPA基础.............................................263.3.1 WPA简介......................................263.3.2 WPA分类......................................263.3.3 WPA的改进....................................273.3.4 WPA 2简介....................................283.3.5 WPA面临日的安全问题..........................283.3.6 关于Windows下WPA2支持性....................283.4 WPA-PSK加密设置和连接...............................283.4.1 配置无线路由器.................................293.4.2 Windows下客户端设置..........................303.4.3 Linux下客户端设置.............................30卷4 无线黑客环境准备..........................................324.1 适合的无线网卡........................................324.1.1 无线网卡的选择.................................324.1.2 无线网卡的芯片.................................334.1.3 总结整理.......................................344.2 必备操作系统..........................................354.2.1 BackTrack4 Linux...............................354.2.2 Slitaz Aircrack-ng Live CD.......................364.2.3 WiFiSlax.......................................374.2.4 WiFiWay.......................................374.2.5 其它Live CD...................................384.3 Vmware虚拟机下无线攻防测试环境搭建...............................394.3.1 建立全新的无线攻防测试用虚拟机.............................394.3.2 对无线攻防测试用虚拟机进行基本配置.........................414.3.3 了解你的无线攻防测试环境BT4...............................434.4 打造U盘版无线攻防环境................................44Part1:小学篇卷5 搞定WEP加密..............................................505.1 破解须知..............................................505.2 WEP破解利器——Aircrack-ng...........................505.2.1 什么是Aircrack-ng..............................505.2.2 轻松安装Aircrack-ng............................515.3 BT4下破解WEP加密...................................535.3.1 破解WEP加密实战..............................535.3.2 WEP破解常见问题小结..........................595.4 全自动傻瓜工具SpoonWEP2..............................605.4.1 关于SpoonWEP的分类...........................605.4.2 SpoonWEP2实战................................61卷6 搞定WPA-PSK加密..........................................636.1 第二个破解须知........................................636.2 WPA破解利器——Cowpatty.............................646.2.1 什么是Cowpatty................................646.2.2 轻松安装Cowpatty..............................646.3 BT4下破解WPA-PSK加密..............................666.3.1 破解WPA-PSK加密实战.........................666.3.2 使用Cowpatty破解WPA-PSK加密..............................696.3.3 WPA-PSK破解常见问题小结.....................706.4 全自动傻瓜工具SpoonWPA..............................71卷7 自己动手,制作破解专用字典.................................747.1 制作破解专用字典......................................747.2 BackTrack2/3/4下默认字典位置.........................757.3 将字典上传至Linux下的方法.............................76卷8 升级进阶必学技能..........................................818.1 突破MAC地址过滤.....................................818.1.1 什么是MAC地址过滤............................818.1.2 让我们来突破MAC地址过滤吧....................828.1.3 如何防范?.....................................878.2 破解关闭SSID的无线网络................................878.3 不再依赖DHCP.........................................92Part2:中学篇卷9 我在悄悄地看着你..........................................959.1 截获及解码无线加密数据................................959.1.1 截获无线加密数据...............................959.1.2 对截获的无线加密数据包解密.....................959.2 分析MSNQQYahoo聊天数据...........................989.3 分析Email论坛账户名及密码............................999.4 分析WEB交互数据....................................1009.4.1 当前访问站点..................................1009.4.2 当前杀毒软件版本判断...........................1019.4.3 当前操作系统判断...............................1019.4.4 当前网络设备识别...............................1029.5 外一篇:我不在咖啡馆,就在去咖啡馆的路上..........................103卷10 渗透的快感10.1 扫描为先.............................................10410.1.1 NMAP & Zenmap..............................10410.1.2 AMAP........................................10610.1.3 Nbtscan.......................................10710.1.4 DNS Walk....................................10710.2 密码破解............................................10810.2.1 Hydra........................................10910.2.2 BruteSSH......................................11110.3 缓冲区溢出(Metasploit3)..............................11210.3.1 关于Metasploit3...............................11210.3.2 Metasploit3的升级..............................11310.3.3 Metasploit3操作实践............................114卷11 无线D.O.S,看不见就被踢下线..............................11711.1 什么是无线D.O.S....................................11711.2 安装无线D.O.S工具...................................11711.2.1 浅谈MDK 3..................................11711.2.2 图形界面无线D.O.S工具——Charon........................12011.2.3 D.O.S攻击工具的使用.........................12111.3 无线D.O.S也疯狂....................................12211.3.1 关于无线连接验证及客户端状态.............................12211.3.2 Auth Flood攻击...............................12211.3.3 Deauth Flood攻击.............................12511.3.4 Association Flood攻击..........................12711.3.5 Disassociation Flood攻击........................12911.3.6 RF Jamming攻击..............................130Part3:大学篇卷12 速度,职业和业余的区别...................................13412.1 什么是WPA-PSK的高速破解..........................13412.2 提升WPA-PSK破解操作实战..........................13912.2.1 回顾Cowpatty套装............................13912.2.2 使用genpmk制作WPA Hash....................13912.3 WPA PMK Hash初体验...............................14012.3.1 使用Hash进行WPA破解 ......................14012.3.2 测试数据对比..................................14112.4 更快的方法——GPU..................................14112.4.1 关于GPU.....................................14112.4.2 GPU编程语言CUDA...........................14212.4.3 GPU在安全领域的应用及发展...............................14312.4.4 将GPU技术用于破解...........................14412.5 不得不提的EWSA.....................................14512.5.1 EWSA的使用准备..............................14512.5.2 使用EWSA进行WPA-PSK破解.............................14612.5.3 未注册EWSA的解决方法.......................14712.6 其它的选择:分布式破解...............................14912.6.1 关于分布式....................................14912.6.2 无线WPA加密分布式破解第一轮公测.........................15012.6.3 加入分布式的意义.............................151卷13 影分身是这样练成的.......................................15113.1 伪造AP并不难.......................................15213.1.1 伪装成合法的AP..............................15213.1.2 恶意创建大量虚假AP信号......................15313.2 搜索及发现伪造AP...................................15413.3 给伪造分身加个护盾...................................160卷14 无客户端破解,敏感的捷径.................................16314.1 什么是无客户端.......................................16314.1.1 关于无客户端的定义...........................16314.1.2 关于无客户端的破解...........................16414.2 无客户端破解第一弹:Chopchop攻击.....................16414.3 无客户端破解第二弹:Fragment攻击....................166Part4:研究生篇卷15 War-Driving,战争驾驶.....................................16915.1 什么是War-Driving...................................16915.1.1 War-Driving的概念............................16915.1.2 了解Hotspot热点地图..........................17015.1.3 War-Driving所用工具及安装....................17115.2 在城市里War-Driving.................................17215.2.1 关于WiFiForm................................17215.2.2 WiFiForm + GPS探测.........................17315.3 绘制热点地图操作指南................................17515.3.1 绘制热点地图.................................17515.3.2 某运营商内部无线热点地图......................17715.3.3 国内某机场无线热点地图........................17815.3.4 某省会城市繁华地段无线热点地图...........................17915.4 一些案例............................................18015.4.1 远程无线攻击的原理............................18115.4.2 真实案例.....................................181卷16 蓝牙,看不见才更危险.....................................18316.1 无处不在的Bluetooth.................................18316.1.1 什么是蓝牙?.................................18316.1.2 蓝牙体系及相关术语...........................18416.1.3 蓝牙适配器的选择.............................18616.1.4 蓝牙(驱动)工具安装..........................18616.1.5 蓝牙设备配对操作.............................18716.2 玩转蓝牙Hacking.....................................18916.2.1 识别及激活蓝牙设备...........................18916.2.2 查看蓝牙设备相关内容.........................19016.2.3 扫描蓝牙设备.................................19116.2.4 蓝牙打印.....................................19216.2.5 蓝牙攻击......................................19316.2.6 修改蓝牙设备地址.............................19416.3 破坏,蓝牙D.O.S ....................................19516.3.1 蓝牙D.O.S实战...............................19616.3.2 蓝牙D.O.S会遇到的问题.......................19816.4 破解不可见的蓝牙设备.................................19916.4.1 什么是不可见?...............................19916.4.2 关于Redfang..................................19916.4.3 使用Redfang进行破解..........................20016.4.4 其它..........................................201卷17 再玩点有意思的..........................................20217.1 Wifizoo.............................................20217.1.1 关于Wifizoo..................................20217.1.2 Wifizoo的安装................................20217.1.3 如何使用Wifizoo..............................20217.2 无线攻击跳板.........................................20517.2.1 关于无线跳板.................................20517.2.2 Airserv-ng+Fpipe..............................20517.2.3 无线跳板实战..................................207尾声:关于“ceng”的一些感想...............................209附录:.............................................210A、无线网卡芯片列表........................................210B、中国计算机安全相关法律及规定............................211C、本书附赠的《黑客手册》专版Backtrack 4 Linux DVD光盘简介...........213光盘目录............................................214
评论关闭。