loveone9
发表于 2009-11-17 12:08
哪里买呀。。。
jianglei88wx
发表于 2009-11-17 12:17
顶!!!x下来玩玩
YSDWL
发表于 2009-11-17 13:04
期盼早日看到。最好先介绍目录。
woolcool
发表于 2009-11-17 13:53
哪里可以买的到
D配置
发表于 2009-11-17 14:57
哇塞!真的是来得早不如来得巧,在哪里可以买到啊?卓越上面现在可以买了没?
pyh0035
发表于 2009-11-17 15:14
等有钱了我也买。。。。。
sunxiangrong
发表于 2009-11-17 16:22
支持老大啊,呵呵,哪里有卖的啊
weiguo2534
发表于 2009-11-17 19:18
楼主辛苦了!!
波塞冬
发表于 2009-11-17 20:12
要了,买一本!
jimmy1988
发表于 2009-11-17 21:57
楼主说了这么多好处,忘记了,怎么买?在哪里买,多少卖?
lznj6
发表于 2009-11-17 22:39
能否介绍详细点啊,
至少给个目录吧
lznj6
发表于 2009-11-17 22:53
转的目录,内容还不错
目录
===
Part0:幼稚园篇
卷1无线基础知识扫盲.......................................................7
1.1什么是无线网络.....................................................7
1.1.1狭义无线网络................................................7
1.1.2广义无线网络................................................9
1.2蓬勃发展的无线城市................................................11
1.3无线安全及Hacking技术的发展......................................12
卷2常见无线网络设备......................................................15
2.1认识无线路由器....................................................15
2.2了解无线网卡......................................................16
2.3走近天线..........................................................17
2.4其它..............................................................18
卷3搭建自己的无线网络....................................................19
3.1WEP基础..........................................................19
3.1.1关于WEP..................................................19
3.1.2WEP及其漏洞..............................................20
3.1.3WEP的改进................................................20
3.2WEP加密设置和连接................................................21
3.2.1配置无线路由器.............................................21
3.2.2Windows下客户端设置.......................................22
3.2.3Linux下客户端设置..........................................23
3.3WPA基础.........................................................26
3.3.1WPA简介..................................................26
3.3.2WPA分类..................................................26
3.3.3WPA的改进................................................27
3.3.4WPA 2简介................................................28
3.3.5WPA面临日的安全问题......................................28
3.3.6关于Windows下WPA2支持性................................28
3.4WPA-PSK加密设置和连接...........................................28
3.4.1配置无线路由器.............................................29
3.4.2Windows下客户端设置......................................30
3.4.3Linux下客户端设置.........................................30
卷4无线黑客环境准备......................................................32
4.1适合的无线网卡....................................................32
4.1.1无线网卡的选择.............................................32
4.1.2无线网卡的芯片.............................................33
4.1.3总结整理...................................................34
4.2必备操作系统......................................................35
4.2.1BackTrack4 Linux...........................................35
4.2.2Slitaz Aircrack-ng Live CD...................................36
4.2.3WiFiSlax...................................................37
4.2.4WiFiWay...................................................37
4.2.5其它Live CD...............................................38
4.3Vmware虚拟机下无线攻防测试环境搭建...............................39
4.3.1建立全新的无线攻防测试用虚拟机.............................39
4.3.2对无线攻防测试用虚拟机进行基本配置.........................41
4.3.3了解你的无线攻防测试环境BT4...............................43
4.4打造U盘版无线攻防环境............................................44
Part1:小学篇
卷5搞定WEP加密..........................................................50
5.1破解须知..........................................................50
5.2WEP破解利器——Aircrack-ng.......................................50
5.2.1什么是Aircrack-ng..........................................50
5.2.2轻松安装Aircrack-ng........................................51
5.3BT4下破解WEP加密...............................................53
5.3.1破解WEP加密实战..........................................53
5.3.2WEP破解常见问题小结......................................59
5.4全自动傻瓜工具SpoonWEP2..........................................60
5.4.1关于SpoonWEP的分类.......................................60
5.4.2SpoonWEP2实战............................................61
卷6搞定WPA-PSK加密......................................................63
6.1第二个破解须知....................................................63
6.2WPA破解利器——Cowpatty.........................................64
6.2.1什么是Cowpatty............................................64
6.2.2轻松安装Cowpatty..........................................64
6.3BT4下破解WPA-PSK加密..........................................66
6.3.1破解WPA-PSK加密实战.....................................66
6.3.2使用Cowpatty破解WPA-PSK加密..............................69
6.3.3WPA-PSK破解常见问题小结.................................70
6.4全自动傻瓜工具SpoonWPA..........................................71
卷7自己动手,制作破解专用字典.............................................74
7.1制作破解专用字典..................................................74
7.2BackTrack2/3/4下默认字典位置.....................................75
7.3将字典上传至Linux下的方法.........................................76
卷8升级进阶必学技能......................................................81
8.1突破MAC地址过滤.................................................81
8.1.1什么是MAC地址过滤........................................81
8.1.2让我们来突破MAC地址过滤吧................................82
8.1.3如何防范?.................................................87
8.2破解关闭SSID的无线网络............................................87
8.3不再依赖DHCP.....................................................92
Part2:中学篇
卷9我在悄悄地看着你......................................................95
9.1截获及解码无线加密数据............................................95
9.1.1截获无线加密数据...........................................95
9.1.2对截获的无线加密数据包解密.................................95
9.2分析MSN\QQ\Yahoo聊天数据.......................................98
9.3分析Email\论坛账户名及密码........................................99
9.4分析WEB交互数据................................................100
9.4.1当前访问站点..............................................100
9.4.2当前杀毒软件版本判断.......................................101
9.4.3当前操作系统判断...........................................101
9.4.4当前网络设备识别...........................................102
9.5外一篇:我不在咖啡馆,就在去咖啡馆的路上..........................103
卷10渗透的快感
10.1扫描为先.........................................................104
10.1.1NMAP & Zenmap..........................................104
10.1.2AMAP....................................................106
10.1.3Nbtscan...................................................107
10.1.4DNS Walk................................................107
10.2密码破解........................................................108
10.2.1Hydra....................................................109
10.2.2BruteSSH..................................................111
10.3缓冲区溢出(Metasploit3)..........................................112
10.3.1关于Metasploit3...........................................112
10.3.2Metasploit3的升级..........................................113
10.3.3Metasploit3操作实践........................................114
卷11无线D.O.S,看不见就被踢下线..........................................117
11.1什么是无线D.O.S................................................117
11.2安装无线D.O.S工具...............................................117
11.2.1浅谈MDK 3..............................................117
11.2.2图形界面无线D.O.S工具——Charon........................120
11.2.3D.O.S攻击工具的使用.....................................121
11.3无线D.O.S也疯狂................................................122
11.3.1关于无线连接验证及客户端状态.............................122
11.3.2Auth Flood攻击...........................................122
11.3.3Deauth Flood攻击.........................................125
11.3.4Association Flood攻击......................................127
11.3.5Disassociation Flood攻击....................................129
11.3.6RF Jamming攻击..........................................130
Part3:大学篇
卷12速度,职业和业余的区别...............................................134
12.1什么是WPA-PSK的高速破解......................................134
12.2提升WPA-PSK破解操作实战......................................139
12.2.1回顾Cowpatty套装........................................139
12.2.2使用genpmk制作WPA Hash................................139
12.3WPAPMK Hash初体验...........................................140
12.3.1使用Hash进行WPA破解 ..................................140
12.3.2测试数据对比..............................................141
12.4更快的方法——GPU..............................................141
12.4.1关于GPU.................................................141
12.4.2GPU编程语言CUDA.......................................142
12.4.3GPU在安全领域的应用及发展...............................143
12.4.4将GPU技术用于破解.......................................144
12.5不得不提的EWSA.................................................145
12.5.1EWSA的使用准备..........................................145
12.5.2使用EWSA进行WPA-PSK破解.............................146
12.5.3未注册EWSA的解决方法...................................147
12.6其它的选择:分布式破解...........................................149
12.6.1关于分布式................................................149
12.6.2无线WPA加密分布式破解第一轮公测.........................150
12.6.3加入分布式的意义.........................................151
卷13影分身是这样练成的...................................................151
13.1伪造AP并不难...................................................152
13.1.1伪装成合法的AP..........................................152
13.1.2恶意创建大量虚假AP信号..................................153
13.2搜索及发现伪造AP...............................................154
13.3给伪造分身加个护盾...............................................160
卷14无客户端破解,敏感的捷径.............................................163
14.1什么是无客户端...................................................163
14.1.1关于无客户端的定义.......................................163
14.1.2关于无客户端的破解.......................................164
14.2无客户端破解第一弹:Chopchop攻击.................................164
14.3无客户端破解第二弹:Fragment攻击................................166
Part4:研究生篇
卷15War-Driving,战争驾驶.................................................169
15.1什么是War-Driving...............................................169
15.1.1War-Driving的概念........................................169
15.1.2了解Hotspot热点地图......................................170
15.1.3War-Driving所用工具及安装................................171
15.2在城市里War-Driving.............................................172
15.2.1关于WiFiForm............................................172
15.2.2WiFiForm + GPS探测.....................................173
15.3绘制热点地图操作指南............................................175
15.3.1绘制热点地图.............................................175
15.3.2某运营商内部无线热点地图..................................177
15.3.3国内某机场无线热点地图....................................178
15.3.4某省会城市繁华地段无线热点地图...........................179
15.4一些案例........................................................180
15.4.1远程无线攻击的原理........................................181
15.4.2真实案例.................................................181
卷16蓝牙,看不见才更危险.................................................183
16.1无处不在的Bluetooth.............................................183
16.1.1什么是蓝牙?.............................................183
16.1.2蓝牙体系及相关术语.......................................184
16.1.3蓝牙适配器的选择.........................................186
16.1.4蓝牙(驱动)工具安装......................................186
16.1.5蓝牙设备配对操作.........................................187
16.2玩转蓝牙Hacking.................................................189
16.2.1识别及激活蓝牙设备.......................................189
16.2.2查看蓝牙设备相关内容.....................................190
16.2.3扫描蓝牙设备.............................................191
16.2.4蓝牙打印.................................................192
16.2.5蓝牙攻击..................................................193
16.2.6修改蓝牙设备地址.........................................194
16.3破坏,蓝牙D.O.S ................................................195
16.3.1蓝牙D.O.S实战...........................................196
16.3.2蓝牙D.O.S会遇到的问题...................................198
16.4破解不可见的蓝牙设备.............................................199
16.4.1什么是不可见?...........................................199
16.4.2关于Redfang..............................................199
16.4.3使用Redfang进行破解......................................200
16.4.4其它......................................................201
卷17再玩点有意思的......................................................202
17.1Wifizoo.........................................................202
17.1.1关于Wifizoo..............................................202
17.1.2Wifizoo的安装............................................202
17.1.3如何使用Wifizoo..........................................202
17.2无线攻击跳板.....................................................205
17.2.1关于无线跳板.............................................205
17.2.2Airserv-ng+Fpipe..........................................205
17.2.3无线跳板实战..............................................207
尾声:关于“ceng”的一些感想...........................................209
附录:.....................................................................210
A、无线网卡芯片列表....................................................210
B、中国计算机安全相关法律及规定........................................211
C、本书附赠的《黑客手册》专版Backtrack 4 Linux DVD光盘简介...........213
光盘目录....................................................................214