LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.
Save up to 30% on print and eBooks.
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Acknowledgments
Technical Editor and Lead Author
Technical Editor and Contributing Author
Contributing Authors
Foreword Contributor
Foreword
Foreword v 1.0
Chapter 1: Introduction to WarDriving and Penetration Testing
Introduction
WarDriving
The Origins of WarDriving
Tools of the Trade or “What Do I Need?”
Putting It All Together
Penetration Testing
Tools for Penetration Testing
Conclusion and What to Expect From this Book
Solutions Fast Track
Chapter 2: Understanding Antennas and Antenna Theory
Introduction
Terminology and Jargon
Differences Between Antenna Types
Other RF Devices
Summary
Solutions Fast Track
Chapter 3: WarDriving With Handheld Devices and Direction Finding
Introduction
WarDriving with a Sharp Zaurus
WarDriving with MiniStumbler
Direction Finding with a Handheld Device
Summary
Solutions Fast Track
Chapter 4: WarDriving and Penetration Testing with Windows
Introduction
WarDriving with NetStumbler
Running NetStumbler
Wireless Penetration Testing with Windows
Summary
Solutions Fast Track
Chapter 5: WarDriving and Penetration Testing with Linux
Introduction
Preparing Your System to WarDrive
WarDriving with Linux and Kismet
Wireless Penetration Testing Using Linux
Summary
Solutions Fast Track
Chapter 6: WarDriving and Wireless Penetration Testing with OS X
Introduction
WarDriving with KisMAC
Penetration Testing with OS X
Other OS X Tools for WarDriving and WLAN Testing
Summary
Solutions Fast Track
Chapter 7: Wireless Penetration Testing Using a Bootable Linux Distribution
Introduction
Core Technologies
Open Source Tools
Case Study
Further Information
Solutions Fast Track
Chapter 8: Mapping WarDrives
Introduction
Using the Global Positioning System Daemon with Kismet
Configuring Kismet for Mapping
Mapping WarDrives with GPSMAP
Summary
Solutions Fast Track
Mapping WarDrives with GPSMap
Chapter 9: Using Man-in-the-Middle Attacks to Your Advantage
Introduction
Hardware for the Attack—Antennas, Amps, WiFi Cards
Identify and Compromise the Target Access Point
The MITM Attack Laptop Configuration
Clone the Target Access Point and Begin the Attack
Summary
Solutions Fast Track
Chapter 10: Using Custom Firmware for Wireless Penetration Testing
Choices for Modifying the Firmware on a Wireless Access Point
Installing OpenWRT on a Linksys WRT54G
Configuring and Understanding the OpenWRT Network Interfaces
Installing and Managing Software Packages for OpenWRT
Enumeration and Scanning from the WRT54G
Installation and Configuration of a Kismet Drone
Installing Aircrack to Crack a WEP Key
Summary
Solutions Fast Track
Chapter 11: Wireless Video Testing
Introduction
Wireless Video Technologies
Tools for Detection
Summary
Solutions Fast Track
Appendix A: Solutions Fast Track
Appendix B: Device Driver Auditing
Index
CH
RR
FT
In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."