Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
VISIT US AT
Copyright
Acknowledgments
Technical Editor and Lead Author
Technical Editor and Contributing Author
Contributing Authors
Foreword Contributor
Foreword
Foreword v 1.0
Chapter 1: Introduction to WarDriving and Penetration Testing
Introduction
WarDriving
The Origins of WarDriving
Tools of the Trade or “What Do I Need?”
Putting It All Together
Penetration Testing
Tools for Penetration Testing
Conclusion and What to Expect From this Book
Solutions Fast Track
Chapter 2: Understanding Antennas and Antenna Theory
Introduction
Terminology and Jargon
Differences Between Antenna Types
Other RF Devices
Summary
Solutions Fast Track
Chapter 3: WarDriving With Handheld Devices and Direction Finding
Introduction
WarDriving with a Sharp Zaurus
WarDriving with MiniStumbler
Direction Finding with a Handheld Device
Summary
Solutions Fast Track
Chapter 4: WarDriving and Penetration Testing with Windows
Introduction
WarDriving with NetStumbler
Running NetStumbler
Wireless Penetration Testing with Windows
Summary
Solutions Fast Track
Chapter 5: WarDriving and Penetration Testing with Linux
Introduction
Preparing Your System to WarDrive
WarDriving with Linux and Kismet
Wireless Penetration Testing Using Linux
Summary
Solutions Fast Track
Chapter 6: WarDriving and Wireless Penetration Testing with OS X
Introduction
WarDriving with KisMAC
Penetration Testing with OS X
Other OS X Tools for WarDriving and WLAN Testing
Summary
Solutions Fast Track
Chapter 7: Wireless Penetration Testing Using a Bootable Linux Distribution
Introduction
Core Technologies
Open Source Tools
Case Study
Further Information
Solutions Fast Track
Chapter 8: Mapping WarDrives
Introduction
Using the Global Positioning System Daemon with Kismet
Configuring Kismet for Mapping
Mapping WarDrives with GPSMAP
Summary
Solutions Fast Track
Mapping WarDrives with GPSMap
Chapter 9: Using Man-in-the-Middle Attacks to Your Advantage
Introduction
Hardware for the Attack—Antennas, Amps, WiFi Cards
Identify and Compromise the Target Access Point
The MITM Attack Laptop Configuration
Clone the Target Access Point and Begin the Attack
Summary
Solutions Fast Track
Chapter 10: Using Custom Firmware for Wireless Penetration Testing
Choices for Modifying the Firmware on a Wireless Access Point
Installing OpenWRT on a Linksys WRT54G
Configuring and Understanding the OpenWRT Network Interfaces
Installing and Managing Software Packages for OpenWRT
Enumeration and Scanning from the WRT54G
Installation and Configuration of a Kismet Drone
Installing Aircrack to Crack a WEP Key
Summary
Solutions Fast Track
Chapter 11: Wireless Video Testing
Introduction
Wireless Video Technologies
Tools for Detection
Summary
Solutions Fast Track
Appendix A: Solutions Fast Track
Appendix B: Device Driver Auditing
Index
← Prev
Back
Next →
← Prev
Back
Next →