Information Technology Reference
In-Depth Information
[4] Berghel H., Uecker J., “WiFi attack vectors”,
Commun. ACM
48
(8) (2005) 21-27.
[5] Fluhrer S., Mantin I., Shamir A., “Weakness in the key scheduling algorithm of RC4”,
[6] Giller R., Bulliard A.,
Wired Equivalent Privacy
, Swiss Institute of Technology, Lau-
sanne, 2004.
[7] Hulton D., “Practical exploitation of RC4 weaknesses in WEP environments”,
http://
www.dachb0den.com/projects/bsd-airtools/wepexp.txt
,
22 Feb. 2002.
[8] Meetinghouse Data Communications, “802.1X—still evolving as a standard”,
http://
www.mtghouse.com/8021X.pdf
,
28 Aug. 2004.
[9] Mikhailovsky A., Gavrilenko K., Vladimirov A.,
Wi-Foo: The Secrets of Wireless Hack-
ing
, Addison-Wesley, Boston, 2004.
[10] Moskowitz R., “Weakness in passphrase choice in WPA interface”,
http://wifinetnews.
com/archives/002452.html
,
04 Nov. 2003.
[11] Newsham T., “Cracking WEP keys”, Presentation: Black Hat, 2001,
http://www.
[12] Peikari C., Fogie S.,
Maximum Wireless Security
, Sams Publishing, Indianapolis, 2002.
[13] Sankar S., Sundaralingam S., Balinsky A., Miller D.,
Cisco Wireless LAN Security
,Cisco
Press, Indianapolis, 2005.
[14] Schneier B., Mudge, “Cryptanalysis of Microsoft's PPTP authentication extensions (MS-
CHAPv2)”,
http://www.schneier.com/paper-pptpv2.html
,
19 Oct. 1999.
[15] Stevens R.W.,
TCP/IP Illustrated
, vol. 1, Addison-Wesley, Boston, 1994.
[16] Strand
L.,
“802.1X
port-based
authentication
HOWTO”,
HOWTO/8021X-HOWTO/intro.html
,
18 Oct. 2004.
[17] Stubblefield A., Ioannidis J., Rubin A.D., “Using the Fluhrer, Mantin, and Shamir at-
tack to break WEP”,
http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/
[18] Vladimirov A., Gavrilenko K., Mikhailovsky A.,
Wi-Foo
, Addison-Wesley, Boston,
2004.
[19] Wright J., “Weaknesses in LEAP challenge/response”, Presentation: Defcon, 2003,
http://