Copyright
Copyright 2007, 2004 O'Reilly Media, Inc. All rights reserved.Printed in the United States of America.
Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.
O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles ( safari.oreilly.com ). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com .
Editor: Brian Sawyer
Production Editor: Philip Dangler
Copyeditor: Rachel Wheeler
Indexer: Ellen Troutman-Zaig
Cover Designer: Karen Montgomery
Interior Designer: David Futato
Illustrators: Robert Romano and Jessamyn Read
Printing History:
April 2004:First Edition.
November 2006:Second Edition.
Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. The Hacks series designations, Network Security Hacks , the image of barbed wire, and related trade dress are trademarks of O'Reilly Media, Inc.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps.
While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
Small print: The technologies discussed in this publication, the limitations on these technologies that technology and content owners seek to impose, and the laws actually limiting the use of these technologies are constantly changing. Thus, some of the hacks described in this publication may not work, may cause unintended harm to systems on which they are used, or may not be consistent with applicable user agreements. Your use of these hacks is at your own risk, and O'Reilly Media, Inc. disclaims responsibility for any damage or expense resulting from their use. In any event, you should take care that your use of these hacks does not violate any applicable laws, including copyright laws.
ISBN 10: 0-596-52763-2
Credits
About the Author
Andrew Lockhart is originally from South Carolina but currently resides in northern Colorado, where he spends his time trying to learn the black art of auditing disassembled binaries and trying to keep from freezing to death. He holds a BS in computer science from Colorado State University and has done security consulting for small businesses in the area. When hes not writing books, hes a senior security analyst with Network Chemistry, a leading provider of wireless security solutions. Andrew is also a member of the Wireless Vulnerabilities and Exploits projects (http://www.wirelessve.org
) editorial board and regularly contributes to their wireless security column at NetworkWorld (http://www.networkworld.com/topics/wireless-security.html
). In his free time, he works on Snort-Wireless (http://snort-wireless.org
), a project intended to add wireless intrusion detection to the popular open source IDS Snort.
Contributors
The following people contributed hacks, writing, and inspiration to this book:
Oktay Altunergil is the founder of The Free Linux CD Project (http://www.freelinuxcd.org
) and one of the maintainers of Turk-PHP.com (a Turkish PHP portal). He also works full-time as a Unix system administrator and PHP programmer.
Michael D. (Mick) Bauer (http://mick.wiremonkeys.org
) writes Linux Journal s Paranoid Penguin security column. By day, he works to keep strangers out of banks computer networks.
Schuyler Erle (http://nocat.net
) is a Free Software developer and activist. His interests include collaborative cartography, wireless networking, software for social and political change, and the Semantic Web. Schuyler is the lead developer of NoCatAuth, the leading open source wireless captive portal.
Bob Fleck (http://www.securesoftware.com
) is Director of Security Services at Secure Software. He consults in the fields of secure development and wireless security and is a coauthor of OReillys 802.11 Security book. The results of his more recent investigations into Bluetooth security can be found at http://bluetooth.shmoo.com
.
Rob Flickenger (http://nocat.net
) is a writer and editor for OReillys Hacks series. He currently spends his time hacking on various projects and promoting community wireless networking.
Preston Gralla is the author of more than 30 books about computers and the Internet, which have been translated into 15 languages, including Windows XP Hacks (OReilly), Internet Annoyances (OReilly), and Windows XP Power Hound (Pogue Press). He has been writing about technology since the dawn of the PC age, and he has been an editor and columnist for many national newspapers, magazines, and web sites. He was the founding editor of PC Week ; a founding editor, then editor, then editorial director of PC/Computing ; and executive editor for ZDNet/CNet. Preston has written about technology for numerous magazines and newspapers, including PC Magazine , Computerworld , CIO Magazine , Computer Shopper , the Los Angeles Times , USA Today , the Dallas Morning News (where he was a technology columnist), and many others. He has been a columnist for ZDNet/CNet and is currently a columnist for TechTarget.com. His commentaries about technology have been featured on National Public Radios All Things Considered, and he has won the award for the Best Feature in a Computer Publication from the Computer Press Association. Under his editorship, PC/Computing was a finalist in the category of General Excellence for the National Magazine Awards. Preston is also the editor of OReillys WindowsDevCenter.com site. He lives in Cambridge, MA, with his wife and two childrenalthough his daughter has recently fled the nest for college. Between writing books, articles, and columns, he swims, plays tennis, goes to the opera, and contemplates the rams skull hanging on the wall of his office.
Michael Lucas (http://www.blackhelicopters.org/~mwlucas/
) lives in a haunted house in Detroit, Michigan, with his wife Liz, assorted rodents, and a multitude of fish. He has been a pet wrangler, a librarian, and a security consultant, and he now works as a network engineer and system administrator with the Great Lakes Technologies Group. Michael is the author of Absolute BSD , Absolute OpenBSD , and Cisco Routers for the Desperate (all from No Starch Press), and he is currently preparing a book about NetBSD.
Matt Messier (http://www.securesoftware.com
) is Director of Engineering at Secure Software and a security authority who has been programming for nearly two decades. In addition to coauthoring the OReilly books