


Paperback
Published: 9th April 2004
ISBN: 9781931836036
Number Of Pages: 512
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.
* Provides the essential information needed to protect and secure wireless networks
* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks
* This is the first book to deal with the hot topic of WarDriving
Foreword | p. xxi |
Learning to WarDrive | p. 1 |
Introduction | p. 2 |
The Origins of WarDriving | p. 2 |
What's in a Name? | p. 3 |
WarDriving Misconceptions | p. 4 |
The Truth about WarDriving | p. 6 |
Tools of the Trade or "What Do I Need?" | p. 7 |
Getting the Hardware | p. 7 |
Choosing a Wireless Network Interface Card | p. 10 |
External Antennas | p. 15 |
Connecting Your Antenna to Your Wireless NIC | p. 22 |
Global Positioning System (GPS) | p. 23 |
Putting It All Together | p. 25 |
Disabling the TCP/IP Stack in Windows | p. 26 |
Disabling the TCP/IP Stack on an iPAQ | p. 28 |
Summary | p. 31 |
Solutions Fast Track | p. 32 |
Frequently Asked Questions | p. 34 |
NetStumbler and MiniStumbler: Overview | p. 37 |
Introduction | p. 38 |
How NetStumbler and MiniStumbler Work | p. 40 |
Wireless Ethernet Cards that Work with NetStumbler and MiniStumbler | p. 41 |
Installation | p. 45 |
NetStumbler Installation | p. 45 |
Running NetStumbler | p. 50 |
NetStumbler Menus and Tool Icons | p. 60 |
Running MiniStumbler | p. 63 |
Summary | p. 66 |
Solutions Fast Track | p. 66 |
Frequently Asked Questions | p. 68 |
Operating NetStumbler and MiniStumbler | p. 71 |
Introduction: "Welcome to the Real World." | p. 72 |
Operational Details | p. 72 |
NDIS 5.1 Drivers, Wireless Cards, and NetStumbler | p. 73 |
Option Settings | p. 83 |
The General Tab | p. 83 |
Disabling Network Protocols | p. 93 |
Additional RF Equipment: Antennae and Cables | p. 96 |
Pigtails | p. 98 |
Using a GPS Receiver with NetStumbler and MiniStumbler | p. 99 |
Typical GPS Problems | p. 100 |
Putting It All Together: The Complete "Stumbling Setup" | p. 104 |
Exporting NetStumbler Data | p. 107 |
Using the Exported Data | p. 109 |
Additional Resources | p. 112 |
Summary | p. 113 |
Solutions Fast Track | p. 113 |
Frequently Asked Questions | p. 116 |
Installing Kismet in Slackware Linux 9.1 | p. 119 |
Introduction | p. 120 |
Preparing Your System for Installation with an ORiNOCO Gold (Hermes Chipset) Card | p. 122 |
Getting pcmcia-cs Patched and Working | p. 122 |
Verifying that It All Works | p. 131 |
Preparing Your System for Installation with a Prism 2 Chipset Card | p. 133 |
Upgrading pcmcia-cs | p. 133 |
Downloading and Installing the wlan-ng Drivers | p. 134 |
Verifying that It All Works | p. 138 |
Installing Kismet | p. 139 |
Obtaining the Kismet Software | p. 139 |
Configuring the Kismet Software for Installation | p. 141 |
Compiling the Kismet Software | p. 144 |
Installing the Kismet Software | p. 144 |
Summary | p. 146 |
Solutions Fast Track | p. 146 |
Frequently Asked Questions | p. 148 |
Installing Kismet in Fedora Core 1 | p. 151 |
Introduction | p. 152 |
Preparing Your System for Installation with an ORiNOCO Gold (Hermes Chipset) Card | p. 152 |
Getting the ORiNOCO Drivers Patched and Working | p. 153 |
Preparing Your System for Installation with a Prism 2 Chipset Card | p. 159 |
Downloading and Installing the wlan-ng Drivers | p. 159 |
Verifying that It All Works | p. 166 |
Installing Kismet | p. 166 |
Obtaining the Kismet Software | p. 166 |
Configuring the Kismet Software for Installation | p. 169 |
Installing the Kismet Software | p. 172 |
Summary | p. 174 |
Solutions Fast Track | p. 174 |
Frequently Asked Questions | p. 176 |
Configuring and Using Kismet | p. 179 |
Introduction | p. 180 |
Using the Global Positioning System Daemon (GPSD) with Kismet | p. 180 |
Installing GPSD | p. 180 |
Starting GPSD | p. 185 |
Configuring Kismet | p. 189 |
Modifying the kismet.conf File | p. 189 |
Starting Kismet | p. 196 |
WarDriving Using Kismet | p. 200 |
The Kismet User Interface | p. 200 |
Keyboard Commands | p. 203 |
Summary | p. 208 |
Solutions Fast Track | p. 209 |
Frequently Asked Questions | p. 211 |
Mapping WarDriving Using StumbVerter | p. 215 |
Introduction | p. 216 |
Mapping the Wireless World | p. 216 |
Basic Mapping Concepts | p. 217 |
Mapping WarDrives with StumbVerter | p. 219 |
Installing StumbVerter | p. 220 |
Generating a Map With StumbVerter | p. 223 |
Mapping WarDrives with DiGLE from WiGLE.net | p. 232 |
Summary | p. 241 |
Solutions Fast Track | p. 241 |
Frequently Asked Questions | p. 242 |
Organizing WarDrives | p. 245 |
Introduction | p. 246 |
The Origin of Organized WarDriving | p. 246 |
The DefCon 10 WarDriving Contest | p. 247 |
Post DefCon 10 Discussion | p. 263 |
The WorldWide WarDrive Is Born | p. 263 |
WorldWide WarDrive 1 | p. 264 |
WorldWide WarDrive 2 | p. 269 |
WorldWide WarDrive 3 | p. 281 |
The DefCon 11 WarDriving Contest | p. 301 |
What the Results of the WorldWide WarDrive Mean | p. 306 |
Analysis of the Results | p. 307 |
Implications of the Results in Regard to Wireless Security | p. 308 |
The Future of the WorldWide WarDrive | p. 308 |
Summary | p. 310 |
Solutions Fast Track | p. 311 |
Frequently Asked Questions | p. 313 |
Attacking Wireless Networks | p. 315 |
Introduction | p. 316 |
The Direct Approach | p. 316 |
Accessing Wireless Networks Using the Direct Approach in Windows | p. 317 |
Accessing Wireless Networks Using the Direct Approach in Linux | p. 324 |
Variation on the Direct Approach in Linux | p. 325 |
Defeating MAC Address Filtering | p. 326 |
Defeating MAC Address Filtering in Windows | p. 326 |
Defeating MAC Address Filtering in Linux | p. 330 |
Finding Cloaked Access Points | p. 332 |
Finding Cloaked Access Points with Kismet | p. 332 |
Finding Cloaked Access Points with AirSnort | p. 333 |
Man-in-the-Middle Attacks on Wireless Networks | p. 333 |
Hijacking and Modifying a Wireless Network | p. 334 |
Attacking Encrypted Networks | p. 336 |
Attacking Wired Equivalent Protection (WEP) Encrypted Networks | p. 336 |
Attacking WiFi Protected Access (WPA) Encrypted Networks | p. 348 |
Summary | p. 349 |
Solutions Fast Track | p. 350 |
Frequently Asked Questions | p. 352 |
Basic Wireless Network Security | p. 355 |
Introduction | p. 356 |
Enabling Security Features on a Linksys WAP11 802.11b Access Point | p. 356 |
Setting a Unique SSID | p. 357 |
Disabling SSID Broadcast | p. 358 |
Enabling WEP | p. 360 |
Filtering by Media Access Control (MAC) Address | p. 362 |
Enabling Security Features on a Linksys BEFW11SR 802.11b Access Point/Router | p. 365 |
Setting a Unique SSID | p. 365 |
Disabling SSID Broadcast | p. 366 |
Enabling WEP | p. 367 |
Filtering by Media Access Control (MAC) Address | p. 368 |
Enabling Security Features on a Linksys WRT54G 802.11b/g Access Point/Router | p. 370 |
Setting a Unique SSID | p. 370 |
Disabling SSID Broadcast | p. 371 |
Enabling WEP | p. 372 |
Filtering by Media Access Control (MAC) Address | p. 373 |
Enabling Security Features on a D-Link DI-624 AirPlus 2.4GHz Xtreme G Wireless Router with 4-Port Switch | p. 376 |
Setting a Unique SSID | p. 376 |
Enabling Wired Equivalent Privacy | p. 377 |
Filtering by Media Access Control (MAC) Address | p. 379 |
Disabling SSID Broadcast | p. 381 |
Configuring Security Features on Wireless Clients | p. 382 |
Configuring Windows XP Clients | p. 382 |
Configuring Windows 2000 Clients | p. 384 |
Configuring Linux Clients | p. 385 |
Summary | p. 390 |
Solutions Fast Track | p. 390 |
Frequently Asked Questions | p. 392 |
Advanced Wireless Network Security | p. 395 |
Introduction | p. 396 |
Implementing WiFi Protected Access (WPA) | p. 396 |
Configuring the D-Link DI-624 AirPlus 2.4GHz Xtreme G Wireless Router with 4-Port Switch | p. 396 |
Configuring the Linksys WRV54G VPN Broadband Router | p. 399 |
Configuring Windows XP Wireless Clients for WPA | p. 402 |
Implementing a Wireless Gateway with Reef Edge Dolphin | p. 404 |
Installing Dolphin | p. 407 |
Configuring Dolphin | p. 412 |
Improving the User Experience | p. 417 |
Dolphin Review | p. 418 |
Implementing a VPN on a Linksys WRV54G VPN Broadband Router | p. 419 |
Preparing Windows 2000 or XP Computers for Use with the WRV54G | p. 420 |
Enabling the VPN on the Linksys WRV54G | p. 428 |
Implementing RADIUS with Cisco LEAP | p. 430 |
LEAP Features | p. 431 |
Building a LEAP Solution | p. 433 |
Installing and Configuring Steel Belted RADIUS | p. 434 |
Configuring LEAP | p. 440 |
Windows Active Directory Domain Authentication with LEAP and RADIUS | p. 446 |
LEAP Review | p. 449 |
Understanding and Configuring 802.1X RADIUS Authentication | p. 449 |
Microsoft RADIUS Servers | p. 450 |
The 802.1X Standard | p. 450 |
Configuring 802.1X Using EAP-TLS on a Microsoft Network | p. 454 |
Summary | p. 475 |
Solutions Fast Track | p. 476 |
Frequently Asked Questions | p. 478 |
Index | p. 479 |
Table of Contents provided by Ingram. All Rights Reserved. |
ISBN: 9781931836036
ISBN-10: 1931836035
Audience:
Professional
Format:
Paperback
Language:
English
Number Of Pages: 512
Published: 9th April 2004
Publisher: Syngress Media,U.S.
Country of Publication: US
Dimensions (cm): 22.9 x 17.8
x 2.67
Weight (kg): 0.73