Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Table of Contents
BackCover
WarDriving-Drive, Detect, Defend-A Guide to Wireless Security
Foreword
Chapter 1: Learning to WarDrive
The Origins of WarDriving
Tools of the Trade or “What Do I Need?”
Putting It All Together
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2: NetStumbler and MiniStumbler: Overview
How NetStumbler and MiniStumbler Work
Installation
Running NetStumbler
Running MiniStumbler
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3: Operating NetStumbler and MiniStumbler
Operational Details
Option Settings
Disabling Network Protocols
Additional RF Equipment: Antennae and Cables
Using a GPS Receiver with NetStumbler and MiniStumbler
Putting It All Together: The Complete “Stumbling Setup”
Exporting NetStumbler Data
Additional Resources
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4: Installing Kismet in Slackware Linux 9.1
Preparing Your System for Installation with an ORiNOCO Gold (Hermes Chipset) Card
Preparing Your System for Installation with a Prism 2 Chipset Card
Installing Kismet
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5: Installing Kismet in Fedora Core 1
Preparing Your System for Installation with an ORiNOCO Gold (Hermes Chipset) Card
Preparing Your System for Installation with a Prism 2 Chipset Card
Installing Kismet
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6: Configuring and Using Kismet
Using the Global Positioning System Daemon (GPSD) with Kismet
Configuring Kismet
Starting Kismet
WarDriving Using Kismet
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7: Mapping WarDrives Using StumbVerter
Mapping the Wireless World
Mapping WarDrives with StumbVerter
Mapping WarDrives with DiGLE from WiGLE.net
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8: Organizing WarDrives
The Origin of Organized WarDriving
The WorldWide WarDrive Is Born
What the Results of the WorldWide WarDrive Mean
The Future of the WorldWide WarDrive
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 9: Attacking Wireless Networks
The Direct Approach
Defeating MAC Address Filtering
Finding Cloaked Access Points
Man-in-the-Middle Attacks on Wireless Networks
Attacking Encrypted Networks
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 10: Basic Wireless Network Security
Enabling Security Features on a Linksys WAP11 802.11b Access Point
Enabling Security Features on a Linksys BEFW11SR 802.11b Access Point/Router
Enabling Security Features on a Linksys WRT54G 802.11b/g Access Point/Router
Enabling Security Features on a D-Link DI-624 AirPlus 2.4GHz Xtreme G Wireless Router with 4-Port Switch
Configuring Security Features on Wireless Clients
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 11: Advanced Wireless Network Security
Implementing WiFi Protected Access (WPA)
Implementing a Wireless Gateway with Reef Edge Dolphin
Implementing a VPN on a Linksys WRV54G VPN Broadband Router
Implementing RADIUS with Cisco LEAP
Understanding and Configuring 802.1X RADIUS Authentication
Summary
Solutions Fast Track
Frequently Asked Questions
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
List of Figures
List of Tables
List of Sidebars
← Prev
Back
Next →
← Prev
Back
Next →