《无线黑客傻瓜书》正式销售——坛友优惠价20.88元
本帖最后由 anywlan授权 于 2009-12-31 14:07 编辑20.88优惠价格,利润已经非常低了(去掉运输成本等仅1元余),请不要再议价。低价销售主要是为了提高淘宝信用,相信大家都明白。
销售地址:http://item.taobao.com/auction/item_detail-0db2-ae97718bb3a5070ada20c3a53181ffff.htm
第一批100本明天(11.21)到货,余400本估计在下周五到货。想一睹为快的趁早了。
关于运输
默认发圆通,快递费用视各省而定,由用户自已支付。广州市内三区运费为6元,请联系店主修改。
一般不发邮政平邮,可发E邮宝(比EMS较为便宜,全国可到,较慢)。由于内含光盘,不建议用邮政(很易损坏),如光盘因运输而损坏的本店不承担责任,购买请先确认。
ISBN:9787900452740
定价:29元
页数:214
http://img08.taobaocdn.com/imgextra/i8/225337/T2oXlXXX0XXXXXXXXX_!!225337.jpg
http://img07.taobaocdn.com/imgextra/i7/225337/T2BFlXXX0XXXXXXXXX_!!225337.jpg
目录
Part0:幼稚园篇
卷1无线基础知识扫盲...........................................7
1.1什么是无线网络.........................................7
1.1.1狭义无线网络....................................7
1.1.2广义无线网络....................................9
1.2蓬勃发展的无线城市....................................11
1.3无线安全及Hacking技术的发展..........................12
卷2常见无线网络设备..........................................15
2.1认识无线路由器........................................15
2.2了解无线网卡..........................................16
2.3走近天线..............................................17
2.4其它..................................................18
卷3搭建自己的无线网络........................................19
3.1WEP基础..............................................19
3.1.1关于WEP......................................19
3.1.2WEP及其漏洞..................................20
3.1.3WEP的改进....................................20
3.2WEP加密设置和连接....................................21
3.2.1配置无线路由器.................................21
3.2.2Windows下客户端设置...........................22
3.2.3Linux下客户端设置..............................23
3.3WPA基础.............................................26
3.3.1WPA简介......................................26
3.3.2WPA分类......................................26
3.3.3WPA的改进....................................27
3.3.4WPA 2简介....................................28
3.3.5WPA面临日的安全问题..........................28
3.3.6关于Windows下WPA2支持性....................28
3.4WPA-PSK加密设置和连接...............................28
3.4.1配置无线路由器.................................29
3.4.2Windows下客户端设置..........................30
3.4.3Linux下客户端设置.............................30
卷4无线黑客环境准备..........................................32
4.1适合的无线网卡........................................32
4.1.1无线网卡的选择.................................32
4.1.2无线网卡的芯片.................................33
4.1.3总结整理.......................................34
4.2必备操作系统..........................................35
4.2.1BackTrack4 Linux...............................35
4.2.2Slitaz Aircrack-ng Live CD.......................36
4.2.3WiFiSlax.......................................37
4.2.4WiFiWay.......................................37
4.2.5其它Live CD...................................38
4.3Vmware虚拟机下无线攻防测试环境搭建...............................39
4.3.1建立全新的无线攻防测试用虚拟机.............................39
4.3.2对无线攻防测试用虚拟机进行基本配置.........................41
4.3.3了解你的无线攻防测试环境BT4...............................43
4.4打造U盘版无线攻防环境................................44
Part1:小学篇
卷5搞定WEP加密..............................................50
5.1破解须知..............................................50
5.2WEP破解利器——Aircrack-ng...........................50
5.2.1什么是Aircrack-ng..............................50
5.2.2轻松安装Aircrack-ng............................51
5.3BT4下破解WEP加密...................................53
5.3.1破解WEP加密实战..............................53
5.3.2WEP破解常见问题小结..........................59
5.4全自动傻瓜工具SpoonWEP2..............................60
5.4.1关于SpoonWEP的分类...........................60
5.4.2SpoonWEP2实战................................61
卷6搞定WPA-PSK加密..........................................63
6.1第二个破解须知........................................63
6.2WPA破解利器——Cowpatty.............................64
6.2.1什么是Cowpatty................................64
6.2.2轻松安装Cowpatty..............................64
6.3BT4下破解WPA-PSK加密..............................66
6.3.1破解WPA-PSK加密实战.........................66
6.3.2使用Cowpatty破解WPA-PSK加密..............................69
6.3.3WPA-PSK破解常见问题小结.....................70
6.4全自动傻瓜工具SpoonWPA..............................71
卷7自己动手,制作破解专用字典.................................74
7.1制作破解专用字典......................................74
7.2BackTrack2/3/4下默认字典位置.........................75
7.3将字典上传至Linux下的方法.............................76
卷8升级进阶必学技能..........................................81
8.1突破MAC地址过滤.....................................81
8.1.1什么是MAC地址过滤............................81
8.1.2让我们来突破MAC地址过滤吧....................82
8.1.3如何防范?.....................................87
8.2破解关闭SSID的无线网络................................87
8.3不再依赖DHCP.........................................92
Part2:中学篇
卷9我在悄悄地看着你..........................................95
9.1截获及解码无线加密数据................................95
9.1.1截获无线加密数据...............................95
9.1.2对截获的无线加密数据包解密.....................95
9.2分析MSN\QQ\Yahoo聊天数据...........................98
9.3分析Email\论坛账户名及密码............................99
9.4分析WEB交互数据....................................100
9.4.1当前访问站点..................................100
9.4.2当前杀毒软件版本判断...........................101
9.4.3当前操作系统判断...............................101
9.4.4当前网络设备识别...............................102
9.5外一篇:我不在咖啡馆,就在去咖啡馆的路上..........................103
卷10渗透的快感
10.1扫描为先.............................................104
10.1.1NMAP & Zenmap..............................104
10.1.2AMAP........................................106
10.1.3Nbtscan.......................................107
10.1.4DNS Walk....................................107
10.2密码破解............................................108
10.2.1Hydra........................................109
10.2.2BruteSSH......................................111
10.3缓冲区溢出(Metasploit3)..............................112
10.3.1关于Metasploit3...............................112
10.3.2Metasploit3的升级..............................113
10.3.3Metasploit3操作实践............................114
卷11无线D.O.S,看不见就被踢下线..............................117
11.1什么是无线D.O.S....................................117
11.2安装无线D.O.S工具...................................117
11.2.1浅谈MDK 3..................................117
11.2.2图形界面无线D.O.S工具——Charon........................120
11.2.3D.O.S攻击工具的使用.........................121
11.3无线D.O.S也疯狂....................................122
11.3.1关于无线连接验证及客户端状态.............................122
11.3.2Auth Flood攻击...............................122
11.3.3Deauth Flood攻击.............................125
11.3.4Association Flood攻击..........................127
11.3.5Disassociation Flood攻击........................129
11.3.6RF Jamming攻击..............................130
Part3:大学篇
卷12速度,职业和业余的区别...................................134
12.1什么是WPA-PSK的高速破解..........................134
12.2提升WPA-PSK破解操作实战..........................139
12.2.1回顾Cowpatty套装............................139
12.2.2使用genpmk制作WPA Hash....................139
12.3WPAPMK Hash初体验...............................140
12.3.1使用Hash进行WPA破解 ......................140
12.3.2测试数据对比..................................141
12.4更快的方法——GPU..................................141
12.4.1关于GPU.....................................141
12.4.2GPU编程语言CUDA...........................142
12.4.3GPU在安全领域的应用及发展...............................143
12.4.4将GPU技术用于破解...........................144
12.5不得不提的EWSA.....................................145
12.5.1EWSA的使用准备..............................145
12.5.2使用EWSA进行WPA-PSK破解.............................146
12.5.3未注册EWSA的解决方法.......................147
12.6其它的选择:分布式破解...............................149
12.6.1关于分布式....................................149
12.6.2无线WPA加密分布式破解第一轮公测.........................150
12.6.3加入分布式的意义.............................151
卷13影分身是这样练成的.......................................151
13.1伪造AP并不难.......................................152
13.1.1伪装成合法的AP..............................152
13.1.2恶意创建大量虚假AP信号......................153
13.2搜索及发现伪造AP...................................154
13.3给伪造分身加个护盾...................................160
卷14无客户端破解,敏感的捷径.................................163
14.1什么是无客户端.......................................163
14.1.1关于无客户端的定义...........................163
14.1.2关于无客户端的破解...........................164
14.2无客户端破解第一弹:Chopchop攻击.....................164
14.3无客户端破解第二弹:Fragment攻击....................166
Part4:研究生篇
卷15War-Driving,战争驾驶.....................................169
15.1什么是War-Driving...................................169
15.1.1War-Driving的概念............................169
15.1.2了解Hotspot热点地图..........................170
15.1.3War-Driving所用工具及安装....................171
15.2在城市里War-Driving.................................172
15.2.1关于WiFiForm................................172
15.2.2WiFiForm + GPS探测.........................173
15.3绘制热点地图操作指南................................175
15.3.1绘制热点地图.................................175
15.3.2某运营商内部无线热点地图......................177
15.3.3国内某机场无线热点地图........................178
15.3.4某省会城市繁华地段无线热点地图...........................179
15.4一些案例............................................180
15.4.1远程无线攻击的原理............................181
15.4.2真实案例.....................................181
卷16蓝牙,看不见才更危险.....................................183
16.1无处不在的Bluetooth.................................183
16.1.1什么是蓝牙?.................................183
16.1.2蓝牙体系及相关术语...........................184
16.1.3蓝牙适配器的选择.............................186
16.1.4蓝牙(驱动)工具安装..........................186
16.1.5蓝牙设备配对操作.............................187
16.2玩转蓝牙Hacking.....................................189
16.2.1识别及激活蓝牙设备...........................189
16.2.2查看蓝牙设备相关内容.........................190
16.2.3扫描蓝牙设备.................................191
16.2.4蓝牙打印.....................................192
16.2.5蓝牙攻击......................................193
16.2.6修改蓝牙设备地址.............................194
16.3破坏,蓝牙D.O.S ....................................195
16.3.1蓝牙D.O.S实战...............................196
16.3.2蓝牙D.O.S会遇到的问题.......................198
16.4破解不可见的蓝牙设备.................................199
16.4.1什么是不可见?...............................199
16.4.2关于Redfang..................................199
16.4.3使用Redfang进行破解..........................200
16.4.4其它..........................................201
卷17再玩点有意思的..........................................202
17.1Wifizoo.............................................202
17.1.1关于Wifizoo..................................202
17.1.2Wifizoo的安装................................202
17.1.3如何使用Wifizoo..............................202
17.2无线攻击跳板.........................................205
17.2.1关于无线跳板.................................205
17.2.2Airserv-ng+Fpipe..............................205
17.2.3无线跳板实战..................................207
尾声:关于“ceng”的一些感想...............................209
附录:.............................................210
A、无线网卡芯片列表........................................210
B、中国计算机安全相关法律及规定............................211
C、本书附赠的《黑客手册》专版Backtrack 4 Linux DVD光盘简介...........213
光盘目录............................................214
http://forum.anywlan.com/attachment.php?aid=NjUyNjJ8OGRkZWY5OTd8MTI1ODY4OTczM3xiMTBlR3BxNDhjLzFINUJKWkZTUzZVdkdWSlJxczJUYkVMSHB6anlkYlpKWm1hMA%3D%3D&noupdate=yes 下载 (63.11 KB)
2009-11-14 02:06 终于开卖了… pai pai ppppppppppppppppppppppppppp 价格确实不错,支持了。 支持了。拍下了 我也来本吧。。。哈 至北京:快递: 12.0元十块多好:) 至北京:快递: 12.0元十块多好
think7 发表于 2009-11-20 17:16 http://forum.anywlan.com/images/common/back.gif
的确是10元的,运费模板改成10元了。 适合我买了 已预定了....... 准备入手了~~~~~ :lol:lol看看在说。:lol:lol