Foreword |
|
xv | |
Acknowledgments |
|
xvii | |
Introduction |
|
xix | |
Part I Hacking 802.11 Wireless Technology |
|
|
Case Study: Twelve Volt Hero |
|
|
2 | (1) |
|
1 Introduction to 802.11 Hacking |
|
|
3 | (28) |
|
|
4 | (5) |
|
|
4 | (1) |
|
Addressing in 802.11 Packets |
|
|
5 | (1) |
|
|
5 | (4) |
|
|
9 | (7) |
|
|
16 | (14) |
|
A Note on the Linux Kernel |
|
|
16 | (1) |
|
Chipsets and Linux Drivers |
|
|
17 | (1) |
|
Modern Chipsets and Drivers |
|
|
18 | (2) |
|
|
20 | (5) |
|
|
25 | (3) |
|
|
28 | (1) |
|
|
28 | (2) |
|
|
30 | (1) |
|
2 Scanning and Enumerating 802.11 Networks |
|
|
31 | (32) |
|
Choosing an Operating System |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (3) |
|
|
33 | (3) |
|
Windows Sniffing/Injection Tools |
|
|
36 | (8) |
|
NDIS 6.0 Monitor Mode Support (NetMon/MessageAnalyzer) |
|
|
36 | (2) |
|
|
38 | (2) |
|
|
40 | (4) |
|
|
44 | (4) |
|
|
44 | (4) |
|
|
48 | (8) |
|
|
48 | (5) |
|
|
53 | (3) |
|
Advanced Visualization Techniques (PPI) |
|
|
56 | (6) |
|
Visualizing PPI-Tagged Kismet Data |
|
|
57 | (2) |
|
PPI-Based Triangulation (Servo-Bot) |
|
|
59 | (3) |
|
|
62 | (1) |
|
3 Attacking 802.11 Wireless Networks |
|
|
63 | (26) |
|
|
64 | (1) |
|
Security Through Obscurity |
|
|
64 | (7) |
|
|
71 | (12) |
|
|
71 | (12) |
|
Putting It All Together with Wifite |
|
|
83 | (4) |
|
Installing Wifite on a WiFi Pineapple |
|
|
83 | (4) |
|
|
87 | (2) |
|
4 Attacking WPA-Protected 802.11 Networks |
|
|
89 | (38) |
|
Obtaining the Four-Way Handshake |
|
|
91 | (4) |
|
Cracking with Cryptographic Acceleration |
|
|
95 | (14) |
|
Breaking Authentication: WPA Enterprise |
|
|
109 | (17) |
|
Obtaining the EAP Handshake |
|
|
110 | (1) |
|
|
111 | (2) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (2) |
|
|
117 | (1) |
|
|
118 | (2) |
|
Running a Malicious RADIUS Server |
|
|
120 | (6) |
|
|
126 | (1) |
|
5 Attacking 802.11 Wireless Clients |
|
|
127 | (28) |
|
browser_autopwn: A Poor Man's Exploit Server |
|
|
128 | (4) |
|
Using Metasploit browser_autopwn |
|
|
129 | (3) |
|
Getting Started with I-love-my-neighbors |
|
|
132 | (4) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
Serving HTTP Content with Squid |
|
|
136 | (1) |
|
Attacking Clients While Attached to an AP |
|
|
136 | (6) |
|
Associating to the Network |
|
|
137 | (5) |
|
|
142 | (10) |
|
Direct Client Injection Techniques |
|
|
152 | (2) |
|
|
154 | (1) |
|
6 Taking It All the Way: Bridging the Air-Gap from Windows 8 |
|
|
155 | (35) |
|
|
157 | (7) |
|
Exploiting Hotspot Environments |
|
|
161 | (2) |
|
|
163 | (1) |
|
Local Wireless Reconnaissance |
|
|
164 | (7) |
|
Remote Wireless Reconnaissance |
|
|
171 | (9) |
|
|
173 | (1) |
|
|
173 | (7) |
|
Target Wireless Network Attack |
|
|
180 | (7) |
|
|
187 | (3) |
Part II Bluetooth |
|
|
Case Study: You Can Still Hack What You Can't See |
|
|
190 | (1) |
|
7 Bluetooth Classic Scanning and Reconnaissance |
|
|
191 | (38) |
|
Bluetooth Classic Technical Overview |
|
|
192 | (5) |
|
|
193 | (1) |
|
|
193 | (3) |
|
|
196 | (1) |
|
Encryption and Authentication |
|
|
196 | (1) |
|
|
197 | (2) |
|
Selecting a Bluetooth Classic Attack Device |
|
|
197 | (2) |
|
|
199 | (22) |
|
|
200 | (10) |
|
|
210 | (1) |
|
|
211 | (3) |
|
|
214 | (7) |
|
|
221 | (6) |
|
|
227 | (2) |
|
8 Bluetooth Low Energy Scanning and Reconnaissance |
|
|
229 | (20) |
|
Bluetooth Low Energy Technical Overview |
|
|
230 | (7) |
|
|
231 | (1) |
|
Operating Modes and Connection Establishment |
|
|
231 | (1) |
|
|
232 | (3) |
|
|
235 | (1) |
|
Bluetooth Low Energy Security Controls |
|
|
235 | (2) |
|
Scanning and Reconnaissance |
|
|
237 | (10) |
|
|
247 | (2) |
|
9 Bluetooth Eavesdropping |
|
|
249 | (38) |
|
Bluetooth Classic Eavesdropping |
|
|
250 | (15) |
|
Open Source Bluetooth Classic Sniffing |
|
|
251 | (4) |
|
Commercial Bluetooth Classic Sniffing |
|
|
255 | (10) |
|
Bluetooth Low Energy Eavesdropping |
|
|
265 | (11) |
|
Bluetooth Low Energy Connection Following |
|
|
267 | (7) |
|
Bluetooth Low Energy Promiscuous Mode Following |
|
|
274 | (2) |
|
Exploiting Bluetooth Networks Through Eavesdropping Attacks |
|
|
276 | (9) |
|
|
285 | (2) |
|
10 Attacking and Exploiting Bluetooth |
|
|
287 | (39) |
|
|
288 | (12) |
|
Bluetooth Classic PIN Attacks |
|
|
289 | (5) |
|
Bluetooth Low Energy PIN Attacks |
|
|
294 | (3) |
|
Practical Pairing Cracking |
|
|
297 | (3) |
|
Device Identity Manipulation |
|
|
300 | (4) |
|
Bluetooth Service and Device Class |
|
|
300 | (4) |
|
Abusing Bluetooth Profiles |
|
|
304 | (10) |
|
Testing Connection Access |
|
|
304 | (2) |
|
|
306 | (4) |
|
|
310 | (4) |
|
|
314 | (9) |
|
iBeacon Deployment Example |
|
|
315 | (8) |
|
|
323 | (3) |
Part III More Ubiquitous Wireless |
|
|
Case Study: Failure Is Not an Option |
|
|
326 | (1) |
|
11 Software-Defined Radios |
|
|
327 | (32) |
|
|
328 | (2) |
|
Choosing a Software Defined Radio |
|
|
330 | (3) |
|
RTL-SDR: Entry-Level Software-Defined Radio |
|
|
331 | (1) |
|
HackRF: Versatile Software-Defined Radio |
|
|
332 | (1) |
|
Getting Started with SDRs |
|
|
333 | (9) |
|
Setting Up Shop on Windows |
|
|
333 | (1) |
|
|
333 | (2) |
|
SDR# and gqrx: Scanning the Radio Spectrum |
|
|
335 | (7) |
|
Digital Signal Processing Crash Course |
|
|
342 | (15) |
|
Rudimentary Communication |
|
|
343 | (1) |
|
Rudimentary (Wireless) Communication |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
Finding and Capturing an RF Transmission |
|
|
347 | (1) |
|
Blind Attempts at Replay Attacks |
|
|
348 | (8) |
|
|
356 | (1) |
|
|
357 | (2) |
|
12 Hacking Cellular Networks |
|
|
359 | (46) |
|
Fundamentals of Cellular Communication |
|
|
360 | (2) |
|
Cellular Network RF Frequencies |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (25) |
|
|
363 | (1) |
|
|
363 | (2) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (8) |
|
|
374 | (9) |
|
|
383 | (4) |
|
|
387 | (9) |
|
|
396 | (7) |
|
|
397 | (1) |
|
|
398 | (2) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
401 | (2) |
|
|
403 | (2) |
|
|
405 | (56) |
|
|
406 | (7) |
|
ZigBee's Place as a Wireless Standard |
|
|
407 | (1) |
|
|
407 | (1) |
|
ZigBee History and Evolution |
|
|
408 | (1) |
|
|
409 | (4) |
|
|
413 | (1) |
|
|
413 | (4) |
|
Rules in the Design of ZigBee Security |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
417 | (34) |
|
Introduction to KillerBee |
|
|
417 | (9) |
|
|
426 | (1) |
|
|
427 | (9) |
|
|
436 | (3) |
|
|
439 | (2) |
|
|
441 | (10) |
|
|
451 | (7) |
|
Network Discovery and Location |
|
|
451 | (2) |
|
Analyzing the ZigBee Hardware |
|
|
453 | (3) |
|
|
456 | (2) |
|
|
458 | (3) |
|
14 Hacking Z-Wave Smart Homes |
|
|
461 | (38) |
|
|
462 | (12) |
|
|
462 | (8) |
|
|
470 | (4) |
|
|
474 | (23) |
|
|
474 | (17) |
|
|
491 | (6) |
|
|
497 | (2) |
Index |
|
499 | |