WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.
* Provides the essential information needed to protect and secure wireless networks
* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks
* This is the first book to deal with the hot topic of WarDriving
What people are saying - Write a review
WarDriving - Drive, Detect, Defend: A Guide to Wireless SecurityUser Review - Not Available - Book Verdict
WarDriving--or moving around an area to map wireless access points--presents an opportunity for those interested in raising awareness of wireless connectivity and security vulnerabilities; an opening ... Read full review
Operating NetStumbler and MiniStumbler
Installing Kismet in Slackware Linux 91
Installing Kismet in Fedora Core 1
Configuring and Using Kismet
Mapping WarDrives Using StumbVerter
Other editions - View all
802.1X authentication AirSnort allow attacker blackwave cable certificate channel chapter chipset Cisco command configure connect connector Default SSID DefCon deployed device disabled SSID broadcast Dolphin server EAP-TLS encryption external antenna Filter format Frequently Asked Questions GPS receiver GPSD IAS server icon ifconfig IP address IPSec Kismet Kismet user laptop LEAP Linksys Linux MAC address MapPoint Microsoft Microsoft MapPoint monitor mode NetStumbler NetStumbler and MiniStumbler option ORiNOCO ORiNOCO card ORiNOCO driver password patch pcmcia-cs PocketPC port pre-shared key Prism Protocol radio button RADIUS server restart scanning script Security Features serial Service Set Identifier shown in Figure signal Slackware SSID StumbVerter switch TCP/IP teams unique SSID upload WarDriving Contest WEP key Windows XP wired wireless card wireless client wireless network WLAN wlan-ng WorldWide WarDrive WWWD
Page i - With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based service that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. Solutions@syngress.com is an...
Page ix - Briefings. Russ holds an associate's degree in Applied Communications Technology from the Community College of the Air Force, a bachelor's degree from the University of Maryland in computer information systems, and a master's degree from the University of Maryland in computer systems management. Russ is a member of the Information System Security Association (ISSA...
Page vii - Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer...