WarDriving and Wireless Penetration Testing
β Scribed by Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker
- Publisher
- Syngress
- Year
- 2007
- Tongue
- English
- Leaves
- 449
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks. * According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008. * The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers. * Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
β¦ Table of Contents
Cover
Contents
Foreword
Foreword v 1.0
Chapter 1 Introduction to WarDriving and Penetration Testing
Introduction
WarDriving
The Origins of WarDriving
Tools of the Trade or βWhat Do I Need?β
Putting It All Together
Penetration Testing
Tools for Penetration Testing
Conclusion and What to Expect From this Book
Chapter 2 Understanding Antennas and Antenna Theory
Introduction
Terminology and Jargon
Differences Between Antenna Types
Other RF Devices
Chapter 3 Handheld Devices and Direction Finding
Introduction
WarDriving with a Sharp Zaurus
WarDriving with MiniStumbler
Direction Finding with a Handheld Device
Chapter 4 WarDriving and Penetration Testing with Windows
Introduction
WarDriving with NetStumbler
Running NetStumbler
Wireless Penetration Testing with Windows
Chapter 5 WarDriving and Penetration Testing with Linux
Introduction
Preparing Your System to WarDrive
WarDriving with Linux and Kismet
Wireless Penetration Testing Using Linux
Chapter 6 WarDriving and Wireless Penetration Testing with OS X
Introduction
WarDriving with KisMAC
Penetration Testing with OS X
Other OS X Tools for WarDriving and WLAN Testing
Chapter 7 Wireless Penetration Testing Using a Bootable Linux Distribution
Introduction
Core Technologies
Open Source Tools
Case Study
Further Information
Chapter 8 Mapping WarDrives
Introduction
Using the Global Positioning System Daemon with Kismet
Configuring Kismet for Mapping
Mapping WarDrives with GPSMAP
Mapping WarDrives with StumbVerter
Chapter 9 Using Man-in-the- Middle Attacks to Your Advantage
Introduction
Hardware for the Attackβ Antennas, Amps, WiFi Cards
Identify and Compromise the Target Access Point
The MITM Attack Laptop Configuration
Clone the Target Access Point and Begin the Attack
Chapter 10 Using Custom Firmware for Wireless Penetration Testing
Choices for Modifying the Firmware on a Wireless Access Point
Installing OpenWRT on a Linksys WRT54G
Configuring and Understanding the OpenWRT Network Interfaces
Installing and Managing Software Packages for OpenWRT
Enumeration and Scanning from the WRT54G
Installation and Configuration of a Kismet Drone
Installing Aircrack to Crack a WEP Key
Chapter 11 Wireless Video Testing
Introduction
Wireless Video Technologies
Tools for Detection
Appendix A Solutions Fast Track
Appendix B Device Driver Auditing By David Maynor
Introduction
Why Should You Care?
What Is a Device Driver?
Summary
Index
π SIMILAR VOLUMES
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. Unlike other wireless networking and security books that have been published in recen
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. Unlike other wireless networking and security books that have been published in rece
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent
WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks. As wireless networking continues to spread in corporate and govern
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.<br><br>Unlike other wireless networking and security books that have been published i