Errata

Beautiful Security

Errata for Beautiful Security

Submit your own errata for this product.

The errata list is a list of errors and their corrections that were found after the product was released.

The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.

Color Key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update

Version Location Description Submitted by Date submitted
Printed Page 28
last paragraph

"For a hacker to be successful, a few conditions need to take place. The most obvious is that the hacker must be able to receive the wireless signal from the access point."
Not true (I think that this was discovered long after the book was published)

Only half of a valid EAPOL handshake is required to begin cracking the password. To crack the PSK for an AP positioned deep inside a facility (far out of range) an attacker can create a rogue WPA access point with the same ESSID and any random PSK (using something like hostapd). The attacker can then wait for a user of the legitimate AP to exit the building and when the device gets within range of the attacker, it will try to connect automatically, whereby the attacker will sniff the half valid handshake with a separate monitor interface. The device will obviously fail to authenticate but the damage is already done.

This removes the AP from the equation entirely. Here is the PoC (not mine)
https://github.com/dxa4481/WPA2-HalfHandshake-Crack

Joseph Hutchins  Feb 17, 2016 
Printed Page 28
last paragraph

"For a hacker to be successful, a few conditions need to take place. The most obvious is that the hacker must be able to receive the wireless signal from the access point."
Not true (I think that this was discovered long after the book was published)

Only half of a valid EAPOL handshake is required to begin cracking the password. To crack the PSK for an AP positioned deep inside a facility (far out of range) an attacker can create a rogue WPA access point with the same ESSID and any random PSK (using something like hostapd). The attacker can then wait for a user of the legitimate AP to exit the building and when the device gets within range of the attacker, it will try to connect automatically, whereby the attacker will sniff the half valid handshake with a separate monitor interface. The device will obviously fail to authenticate but the damage is already done.

This removes the AP from the equation entirely. Here is the PoC (not mine)
https://github.com/dxa4481/WPA2-HalfHandshake-Crack

Joseph Hutchins  Feb 17, 2016 
Printed Page 36
last paragraph

The sentence "The point is that doctors don't attempt to give one a patient an all-encompassing score." should not contain the word "one".

Dennis Sutch  Mar 09, 2010 
Printed Page 97
Figure 6-6

The top ad (of the three), about Ringtones doesn't fit here; it is a duplicate of the 2nd ad in Figure 6-4.

Allen Stenger  Jun 28, 2009 
Printed Page 267
lines 11-12

Carnegie Melon should be Carnegie Mellon

Allen Stenger  Jun 28, 2009