Linksys WRT54G Ultimate Hacking


  • Paul Asadoorian, (GCIA, GCIH), Lead IT Security Engineer
  • Larry Pesce, (CCNA, GCFA Silver, GAWN Gold), Manager for Information Services Security

This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G’s hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.
View full description


Computer users, security professionals (such as a penetration tester), hardware hackers, and network/system administrators.


Book information

  • Published: June 2007
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-166-2

Table of Contents

Chapter 1 - About the WRT54G - The History of the Linksys WRT54G, Linksys WRT54G/WRT54GL Hardware, Linksys WRT54GS Hardware, WRTSL54GS (WRT54G + USB = Awesome)Chapter 2 - WRT54G Family Firmware , Installation Methods (Web Interface, TFTP, Serial), Firmware (OpenWRT, DD-WRT), Securing firmwareChapter 3 - WRT54G Fun Projects - Community Bulletin board , Wireless Honeypot , Wardriving In-A-Box , Wireless range extender , Wireless Gaming Adapter , Captive portal , Asterisk Chapter 4 - Securing wireless using a WRT54G - Introduction to WPA/WPA2 (802.11i), Configuring WPA-PSK , Configuring WPA-Enterprise , Authentication Methods – 802.11x, Radius, etc Chapter 5 - WRT54G For Penetration Testers - Installing and configuring FeruziaWRT , Security Tools using OpenWRT (Nessus, Kismet, Snort, WiSpy)Chapter 6 - WRT54G Hardware Hacking - Fun with Wireless Antennas , Adding Ports: USB, Serial, JTAG, Resetting the firmware, Making a battery pack, Attaching it to your laptop, WRT54G projectile wireless network destructionChapter 7 - Developing Software for the WRT54G - Tools required, Coding and Testing, Making PackagesChapter 8 - Troubleshooting WRT54G - Debug Modes, Recovering from a bad flash – de-bricking