Software Blogs - BlogCatalog Blog Directory security wireless network: Abbreviations

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

jueves, 4 de marzo de 2010

Abbreviations

μs microseconds
2G second generation (cellular)
3G third generation (cellular)
AC access category
ACK acknowledgement
ADC analog-to-digital converter
ADDBA add block acknowledgement
ADDTS add traffic stream
AGC automatic gain control
AID association identifier
AIFS arbitration inter-frame space
A-MPDU aggregate MAC protocol data unit
A-MSDU aggregate MAC service data unit
AoA angle of arrival
AoD angle of departure
AP access point
APSD automatic power save delivery
A-PSDU aggregate PHY service data unit
AS angular spectrum
ASEL antenna selection
AWGN additive white Gaussian noise
BA block acknowledgement
BAR block acknowledgement request
BCC binary convolution code
BF beamforming
BICM bit interleaved coded modulation
bps bits-per-second
BPSCS coded bits per single carrier for each spatial stream
BPSK binary phase shift keying
BSS basic service set
BSSID BSS identifier
BW bandwidth
CBPS coded bits per symbol
CBPSS coded bits per spatial stream
CBW channel bandwidth
CCA clear channel assessment
CCDF complementary cumulative distribution function
CCK complementary code keying
CFP contention free period
CP contention period
CRC cyclic redundancy code
CS carrier sense
CSD cyclic shift diversity
CSI channel state information
CSMA carrier sense multiple access
CSMA/CA carrier sense multiple access with collision avoidance
CSMA/CD carrier sense multiple access with collision detection
CTS clear to send
CW contention window
DA destination address
DAC digital-to-analog converter
dB decibels
dBc decibels relative to carrier
dBi decibels isotropic relative to an antenna
dBm decibel of measured power referenced to one milliwatt
DBPS data bits per OFDM symbol
dBr dB (relative)
DC direct current
DCF distributed coordination function
DELBA delete block acknowledgement
DIFS DCF inter-frame space
DLS direct link session
DS distribution system
DSL digital subscriber line
DSSS direct sequence spread spectrum
DTIM delivery traffic indication message
DVD digital versatile disc
EDCA enhanced distributed channel access
EIFS extended inter-frame space
ERP enhanced rate PHY
ESS extended service set
ETSI European Telecommunications Standards Institute
EVM error vector magnitude
EWC Enhanced Wireless Consortium
FCC Federal Communications Commission
FCS frame check sequence
FEC forward error correction
FFT fast Fourier transform
FHSS frequency hopped spread spectrum
FS free space
FTP file transfer protocol
GF Greenfield
GF-HT-STF Greenfield High Throughput Short Training field
GHz gigahertz
GI guard interval
GIF graphics interchange format
GPS global positioning system
HC hybrid coordinator
HCCA HCF controlled channel access
HCF hybrid coordination function
HEMM HCCA, EDCA mixed mode
HT high throughput
HTC high throughput control
HT-DATA High Throughput Data field
HT-LTF High Throughput Long Training field
HTSG High Throughput Study Group
HT-SIG High Throughput Signal field
HT-STF High Throughput Short Training field
HTTP hypertext transfer protocol
Hz Hertz
IBSS independent basic service set
IC integrated circuit
IDFT inverse discrete Fourier transform
IEEE Institute of Electrical and Electronic Engineers
IFFT inverse fast Fourier transform
IFS inter-frame space
IP Internet Protocol
IPv6 Internet Protocol version 6
IR infrared
ISI inter-symbol interference
ISM industrial, scientific, and medical
JPEG Joint Photographic Experts Group
kHz kilohertz
km/h kilometers per hour
LAN local area networking
LDPC low density parity check
LLC logical link control
L-LTF Non-HT (Legacy) Long Training field
LNA low noise amplifier
LOS line-of-sight
LSB least significant bit
L-SIG Non-HT (Legacy) Signal field
L-STF Non-HT (Legacy) Short Training field
LTF Long Training field
m meters
MAC medium access control
MAI MRQ or ASEL indication
MAN metropolitan area networking
Mbps megabit per second
MCS modulation and coding scheme
MF mixed format
MFB MCS feedback
MFSI MCS feedback sequence indication
MHz megahertz
MIB management information base
MIMO multiple-input multiple-output
ML maximum likelihood
MMPDU MAC management protocol data unit
MMSE minimum mean-square-error
MPDU MAC protocol data unit
MPEG Moving Picture Experts Group
MRC maximal-ratio combining
MRQ MCS request
Msample/s mega-samples per second
MSB most significant bit
MSDU MAC service data unit
MSE mean-square-error
MSFI MCS feedback sequence identifier
MSI MCS request sequence identifier
NAV network allocation vector
NDP null data packet
NF noise figure
NLOS non-line-of-sight
nsec nanosecond
OBO output back-off
OBSS overlapping BSS
OFDM orthogonal frequency division multiplexing
OSI open systems interconnection
PA power amplifier
PAR project authorization request
PAS power angular spectrum
PC point coordinator
PCF point coordination function
PCO phased coexistence operation
PDU protocol data unit
PER packet error rate
PHY physical layer
PIFS PCF inter-frame space
PLCP physical layer convergence procedure
PPDU PLCP protocol data unit
ppm parts per million
PSD power spectral density
PSDU PLCP service data unit
PSMP power-save multi-poll
PSMP-DTT PSMP downlink transmission time
PSMP-UTT PSMP uplink transmission time
QAM quadrature amplitude modulation
QoS quality of service
QPSK quadrature phase shift keying
R code rate
RA receiver address
RD reverse direction
RDG reverse direction grant
RF radio frequency
RIFS reduced inter-frame space
RMS root-mean-square
RSSI received signal strength indication
RTS request to send
Rx receive
SA source address
SAP service access point
SCP secure copy protocol
SDM spatial division multiplexing
SDU service data unit
SE spatial expansion
SIFS short inter-frame space
SIG Signal field
SIMO single-input, multiple-output
SISO single-input, single-output
SMTP simple mail transfer protocol
SNR signal-to-noise ratio
SOHO small-office, home-office
SS spatial stream
SSC starting sequence control
SSID service set identifier
SSN starting sequence number
STA station
STBC space-time block coding
STF Short Training field
STS space-time stream
SVD singular value decomposition
SYM symbol
TA transmitter address
TBTT target beacon transmission time
TC traffic category
TCLAS traffic classification
TCM trellis coded modulation
TCP transmission control protocol
TDD time division duplexing
TGn Task Group n
TGy Task Group y
TID traffic identifier
TIFF tagged image file format
TRQ training request
TS traffic stream
TSID traffic stream identifier
TSPEC traffic specification
TV television
Tx transmit
TxBF transmit beamforming
TXOP transmit opportunity
TXTIME transmit time
UDP user datagram protocol
USA United States of America
VoIP voice over IP
VPN virtual private network
WEP wired equivalent privacy
WFA Wi-Fi Alliance
WLAN wireless local area network
WM wireless medium
WNG SC Wireless Next Generation Standing Committee
WWiSE world wide spectral efficiency
XOR exclusive-or
ZF zero-forcing
ZIP ZIP file format

No hay comentarios:

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs