
WarDriving and Wireless Penetration Testing
- 1st Edition - November 8, 2006
- Imprint: Syngress
- Authors: Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker
- Language: English
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 5 2 0 7 7 - 3
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteUnlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.
* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
Acknowledgments
Technical Editor and Lead Author
Technical Editor and Contributing Author
Contributing Authors
Foreword Contributor
Foreword
Foreword v 1.0
Chapter 1: Introduction to WarDriving and Penetration Testing
Introduction
WarDriving
The Origins of WarDriving
Tools of the Trade or “What Do I Need?”
Putting It All Together
Penetration Testing
Tools for Penetration Testing
Conclusion and What to Expect From this Book
Solutions Fast Track
Chapter 2: Understanding Antennas and Antenna Theory
Introduction
Terminology and Jargon
Differences Between Antenna Types
Other RF Devices
Summary
Solutions Fast Track
Chapter 3: WarDriving With Handheld Devices and Direction Finding
Introduction
WarDriving with a Sharp Zaurus
WarDriving with MiniStumbler
Direction Finding with a Handheld Device
Summary
Solutions Fast Track
Chapter 4: WarDriving and Penetration Testing with Windows
Introduction
WarDriving with NetStumbler
Running NetStumbler
Wireless Penetration Testing with Windows
Summary
Solutions Fast Track
Chapter 5: WarDriving and Penetration Testing with Linux
Introduction
Preparing Your System to WarDrive
WarDriving with Linux and Kismet
Wireless Penetration Testing Using Linux
Summary
Solutions Fast Track
Chapter 6: WarDriving and Wireless Penetration Testing with OS X
Introduction
WarDriving with KisMAC
Penetration Testing with OS X
Other OS X Tools for WarDriving and WLAN Testing
Summary
Solutions Fast Track
Chapter 7: Wireless Penetration Testing Using a Bootable Linux Distribution
Introduction
Core Technologies
Open Source Tools
Case Study
Further Information
Solutions Fast Track
Chapter 8: Mapping WarDrives
Introduction
Using the Global Positioning System Daemon with Kismet
Configuring Kismet for Mapping
Mapping WarDrives with GPSMAP
Summary
Solutions Fast Track
Mapping WarDrives with GPSMap
Chapter 9: Using Man-in-the-Middle Attacks to Your Advantage
Introduction
Hardware for the Attack—Antennas, Amps, WiFi Cards
Identify and Compromise the Target Access Point
The MITM Attack Laptop Configuration
Clone the Target Access Point and Begin the Attack
Summary
Solutions Fast Track
Chapter 10: Using Custom Firmware for Wireless Penetration Testing
Choices for Modifying the Firmware on a Wireless Access Point
Installing OpenWRT on a Linksys WRT54G
Configuring and Understanding the OpenWRT Network Interfaces
Installing and Managing Software Packages for OpenWRT
Enumeration and Scanning from the WRT54G
Installation and Configuration of a Kismet Drone
Installing Aircrack to Crack a WEP Key
Summary
Solutions Fast Track
Chapter 11: Wireless Video Testing
Introduction
Wireless Video Technologies
Tools for Detection
Summary
Solutions Fast Track
Appendix A: Solutions Fast Track
Appendix B: Device Driver Auditing
Index
- Edition: 1
- Published: November 8, 2006
- Imprint: Syngress
- No. of pages: 446
- Language: English
- eBook ISBN: 9780080520773
CH
Chris Hurley
RR
Russ Rogers
FT
Frank Thornton
In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."