+612 9045 4394
 
CHECKOUT
WarDriving : Drive, Detect, Defend - Chris Hurley

WarDriving

Drive, Detect, Defend

Paperback

Published: 9th April 2004
Ships: 7 to 10 business days
7 to 10 business days
$129.90
or 4 easy payments of $32.48 with Learn more
if ordered within

The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.

* Provides the essential information needed to protect and secure wireless networks
* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks
* This is the first book to deal with the hot topic of WarDriving

Forewordp. xxi
Learning to WarDrivep. 1
Introductionp. 2
The Origins of WarDrivingp. 2
What's in a Name?p. 3
WarDriving Misconceptionsp. 4
The Truth about WarDrivingp. 6
Tools of the Trade or "What Do I Need?"p. 7
Getting the Hardwarep. 7
Choosing a Wireless Network Interface Cardp. 10
External Antennasp. 15
Connecting Your Antenna to Your Wireless NICp. 22
Global Positioning System (GPS)p. 23
Putting It All Togetherp. 25
Disabling the TCP/IP Stack in Windowsp. 26
Disabling the TCP/IP Stack on an iPAQp. 28
Summaryp. 31
Solutions Fast Trackp. 32
Frequently Asked Questionsp. 34
NetStumbler and MiniStumbler: Overviewp. 37
Introductionp. 38
How NetStumbler and MiniStumbler Workp. 40
Wireless Ethernet Cards that Work with NetStumbler and MiniStumblerp. 41
Installationp. 45
NetStumbler Installationp. 45
Running NetStumblerp. 50
NetStumbler Menus and Tool Iconsp. 60
Running MiniStumblerp. 63
Summaryp. 66
Solutions Fast Trackp. 66
Frequently Asked Questionsp. 68
Operating NetStumbler and MiniStumblerp. 71
Introduction: "Welcome to the Real World."p. 72
Operational Detailsp. 72
NDIS 5.1 Drivers, Wireless Cards, and NetStumblerp. 73
Option Settingsp. 83
The General Tabp. 83
Disabling Network Protocolsp. 93
Additional RF Equipment: Antennae and Cablesp. 96
Pigtailsp. 98
Using a GPS Receiver with NetStumbler and MiniStumblerp. 99
Typical GPS Problemsp. 100
Putting It All Together: The Complete "Stumbling Setup"p. 104
Exporting NetStumbler Datap. 107
Using the Exported Datap. 109
Additional Resourcesp. 112
Summaryp. 113
Solutions Fast Trackp. 113
Frequently Asked Questionsp. 116
Installing Kismet in Slackware Linux 9.1p. 119
Introductionp. 120
Preparing Your System for Installation with an ORiNOCO Gold (Hermes Chipset) Cardp. 122
Getting pcmcia-cs Patched and Workingp. 122
Verifying that It All Worksp. 131
Preparing Your System for Installation with a Prism 2 Chipset Cardp. 133
Upgrading pcmcia-csp. 133
Downloading and Installing the wlan-ng Driversp. 134
Verifying that It All Worksp. 138
Installing Kismetp. 139
Obtaining the Kismet Softwarep. 139
Configuring the Kismet Software for Installationp. 141
Compiling the Kismet Softwarep. 144
Installing the Kismet Softwarep. 144
Summaryp. 146
Solutions Fast Trackp. 146
Frequently Asked Questionsp. 148
Installing Kismet in Fedora Core 1p. 151
Introductionp. 152
Preparing Your System for Installation with an ORiNOCO Gold (Hermes Chipset) Cardp. 152
Getting the ORiNOCO Drivers Patched and Workingp. 153
Preparing Your System for Installation with a Prism 2 Chipset Cardp. 159
Downloading and Installing the wlan-ng Driversp. 159
Verifying that It All Worksp. 166
Installing Kismetp. 166
Obtaining the Kismet Softwarep. 166
Configuring the Kismet Software for Installationp. 169
Installing the Kismet Softwarep. 172
Summaryp. 174
Solutions Fast Trackp. 174
Frequently Asked Questionsp. 176
Configuring and Using Kismetp. 179
Introductionp. 180
Using the Global Positioning System Daemon (GPSD) with Kismetp. 180
Installing GPSDp. 180
Starting GPSDp. 185
Configuring Kismetp. 189
Modifying the kismet.conf Filep. 189
Starting Kismetp. 196
WarDriving Using Kismetp. 200
The Kismet User Interfacep. 200
Keyboard Commandsp. 203
Summaryp. 208
Solutions Fast Trackp. 209
Frequently Asked Questionsp. 211
Mapping WarDriving Using StumbVerterp. 215
Introductionp. 216
Mapping the Wireless Worldp. 216
Basic Mapping Conceptsp. 217
Mapping WarDrives with StumbVerterp. 219
Installing StumbVerterp. 220
Generating a Map With StumbVerterp. 223
Mapping WarDrives with DiGLE from WiGLE.netp. 232
Summaryp. 241
Solutions Fast Trackp. 241
Frequently Asked Questionsp. 242
Organizing WarDrivesp. 245
Introductionp. 246
The Origin of Organized WarDrivingp. 246
The DefCon 10 WarDriving Contestp. 247
Post DefCon 10 Discussionp. 263
The WorldWide WarDrive Is Bornp. 263
WorldWide WarDrive 1p. 264
WorldWide WarDrive 2p. 269
WorldWide WarDrive 3p. 281
The DefCon 11 WarDriving Contestp. 301
What the Results of the WorldWide WarDrive Meanp. 306
Analysis of the Resultsp. 307
Implications of the Results in Regard to Wireless Securityp. 308
The Future of the WorldWide WarDrivep. 308
Summaryp. 310
Solutions Fast Trackp. 311
Frequently Asked Questionsp. 313
Attacking Wireless Networksp. 315
Introductionp. 316
The Direct Approachp. 316
Accessing Wireless Networks Using the Direct Approach in Windowsp. 317
Accessing Wireless Networks Using the Direct Approach in Linuxp. 324
Variation on the Direct Approach in Linuxp. 325
Defeating MAC Address Filteringp. 326
Defeating MAC Address Filtering in Windowsp. 326
Defeating MAC Address Filtering in Linuxp. 330
Finding Cloaked Access Pointsp. 332
Finding Cloaked Access Points with Kismetp. 332
Finding Cloaked Access Points with AirSnortp. 333
Man-in-the-Middle Attacks on Wireless Networksp. 333
Hijacking and Modifying a Wireless Networkp. 334
Attacking Encrypted Networksp. 336
Attacking Wired Equivalent Protection (WEP) Encrypted Networksp. 336
Attacking WiFi Protected Access (WPA) Encrypted Networksp. 348
Summaryp. 349
Solutions Fast Trackp. 350
Frequently Asked Questionsp. 352
Basic Wireless Network Securityp. 355
Introductionp. 356
Enabling Security Features on a Linksys WAP11 802.11b Access Pointp. 356
Setting a Unique SSIDp. 357
Disabling SSID Broadcastp. 358
Enabling WEPp. 360
Filtering by Media Access Control (MAC) Addressp. 362
Enabling Security Features on a Linksys BEFW11SR 802.11b Access Point/Routerp. 365
Setting a Unique SSIDp. 365
Disabling SSID Broadcastp. 366
Enabling WEPp. 367
Filtering by Media Access Control (MAC) Addressp. 368
Enabling Security Features on a Linksys WRT54G 802.11b/g Access Point/Routerp. 370
Setting a Unique SSIDp. 370
Disabling SSID Broadcastp. 371
Enabling WEPp. 372
Filtering by Media Access Control (MAC) Addressp. 373
Enabling Security Features on a D-Link DI-624 AirPlus 2.4GHz Xtreme G Wireless Router with 4-Port Switchp. 376
Setting a Unique SSIDp. 376
Enabling Wired Equivalent Privacyp. 377
Filtering by Media Access Control (MAC) Addressp. 379
Disabling SSID Broadcastp. 381
Configuring Security Features on Wireless Clientsp. 382
Configuring Windows XP Clientsp. 382
Configuring Windows 2000 Clientsp. 384
Configuring Linux Clientsp. 385
Summaryp. 390
Solutions Fast Trackp. 390
Frequently Asked Questionsp. 392
Advanced Wireless Network Securityp. 395
Introductionp. 396
Implementing WiFi Protected Access (WPA)p. 396
Configuring the D-Link DI-624 AirPlus 2.4GHz Xtreme G Wireless Router with 4-Port Switchp. 396
Configuring the Linksys WRV54G VPN Broadband Routerp. 399
Configuring Windows XP Wireless Clients for WPAp. 402
Implementing a Wireless Gateway with Reef Edge Dolphinp. 404
Installing Dolphinp. 407
Configuring Dolphinp. 412
Improving the User Experiencep. 417
Dolphin Reviewp. 418
Implementing a VPN on a Linksys WRV54G VPN Broadband Routerp. 419
Preparing Windows 2000 or XP Computers for Use with the WRV54Gp. 420
Enabling the VPN on the Linksys WRV54Gp. 428
Implementing RADIUS with Cisco LEAPp. 430
LEAP Featuresp. 431
Building a LEAP Solutionp. 433
Installing and Configuring Steel Belted RADIUSp. 434
Configuring LEAPp. 440
Windows Active Directory Domain Authentication with LEAP and RADIUSp. 446
LEAP Reviewp. 449
Understanding and Configuring 802.1X RADIUS Authenticationp. 449
Microsoft RADIUS Serversp. 450
The 802.1X Standardp. 450
Configuring 802.1X Using EAP-TLS on a Microsoft Networkp. 454
Summaryp. 475
Solutions Fast Trackp. 476
Frequently Asked Questionsp. 478
Indexp. 479
Table of Contents provided by Ingram. All Rights Reserved.

ISBN: 9781931836036
ISBN-10: 1931836035
Audience: General
Format: Paperback
Language: English
Number Of Pages: 495
Published: 9th April 2004
Publisher: SYNGRESS MEDIA
Country of Publication: US
Dimensions (cm): 23.17 x 17.78  x 2.67
Weight (kg): 0.82