Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G’s hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.
Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.
- Never before seen and documented hacks, including wireless spectrum analysis
- Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform
- Full coverage on embedded device development using the WRT54G and OpenWRT
Computer users, security professionals (such as a penetration tester), hardware hackers, and network/system administrators.
Chapter 1 - About the WRT54G - The History of the Linksys WRT54G, Linksys WRT54G/WRT54GL Hardware, Linksys WRT54GS Hardware, WRTSL54GS (WRT54G + USB = Awesome)
Chapter 2 - WRT54G Family Firmware , Installation Methods (Web Interface, TFTP, Serial), Firmware (OpenWRT, DD-WRT), Securing firmware
Chapter 3 - WRT54G Fun Projects - Community Bulletin board , Wireless Honeypot , Wardriving In-A-Box , Wireless range extender , Wireless Gaming Adapter , Captive portal , Asterisk
Chapter 4 - Securing wireless using a WRT54G - Introduction to WPA/WPA2 (802.11i), Configuring WPA-PSK , Configuring WPA-Enterprise , Authentication Methods – 802.11x, Radius, etc
Chapter 5 - WRT54G For Penetration Testers - Installing and configuring FeruziaWRT , Security Tools using OpenWRT (Nessus, Kismet, Snort, WiSpy)
Chapter 6 - WRT54G Hardware Hacking - Fun with Wireless Antennas , Adding Ports: USB, Serial, JTAG, Resetting the firmware, Making a battery pack, Attaching it to your laptop, WRT54G projectile wireless network destruction
Chapter 7 - Developing Software for the WRT54G - Tools required, Coding and Testing, Making Packages
Chapter 8 - Troubleshooting WRT54G - Debug Modes, Recovering from a bad flash – de-bricking
- No. of pages:
- © Syngress 2007
- 19th June 2007
- eBook ISBN:
- Paperback ISBN:
Paul Asadoorian (GCIA, GCIH) is the Lead IT Security Engineer for a large University in the New England area. In the past 6 years he has been responsible for intrusion detection, firewalls, VPN, and networking assessments/penetration testing in the educational IT space. He speaks frequently on topics such as wireless security at various events, such as MIT Security Camp. Paul’s research has been featured in numerous publications such as Network Intrusion Detection, 3rd edition, Securityfocus.com, and the SANS Reading Room. In addition to owning and operating an independent security consulting company, Defensive Intuition, Paul is also the host of PaulDotCom Security Weekly (http://pauldotcom.com), a weekly podcast discussing IT security news, vulnerabilities, hacking, and research, including interviews with some of the top security professionals. Paul graduated from Bryant College with a degree in Computing and Information Systems, and is currently on the SANS GIAC advisory board. When not trying to hack something Paul can be found spending time with his wife and pug, Rocco.
(GCIA, GCIH), Lead IT Security Engineer
Larry Pesce (CCNA, GCFA Silver, GAWN Gold) is the Manager for Information Services Security at a mid-sized healthcare organization in New England. In the last 13 years in the computer industry, Larry has become a jack of all trades; PC repair, Network Engineering, Web Design, Non-Linear Audio and Video production and Computer Security. Larry is also gainfully employed as a Penetration Tester / Ethical Hacker with Defensive Intuition, a Rhode Island based security consulting company. A graduate of Roger Williams University in Computer Information Systems, Larry is currently exploring his options for graduate education. In addition to his industry experience, Larry is also a Security Evangelist and co-host for the PaulDotCom Security Weekly podcast at www.pauldotcom.com. More of Larry’s writing, guides and rants can be found on his blog at www.haxorthematrix.com and the SANS Reading Room.
(CCNA, GCFA Silver, GAWN Gold), Manager for Information Services Security
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.