WarDriving and Wireless Penetration Testing (eBook)
446 Seiten
Elsevier Science (Verlag)
978-0-08-052077-3 (ISBN)
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.
* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.
* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008. * The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers. * Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
Front Cover 1
War Driving & Wireless: Penetration Testing
Copyright Page 5
Contents 14
Chapter 1. Introduction to WarDriving and Penetration Testing 32
Introduction 33
WarDriving 33
The Origins of WarDriving 34
Tools of the Trade or "What Do I Need?" 36
Putting It All Together 45
Penetration Testing 51
Tools for Penetration Testing 56
Conclusion and What to Expect From this Book 57
Solutions Fast Track 58
Frequently Asked Questions 60
Chapter 2. Understanding Antennas and Antenna Theory 62
Introduction 63
Terminology and Jargon 66
Differences Between Antenna Types 74
Other RF Devices 84
Summary 90
Solutions Fast Track 90
Frequently Asked Questions 91
Chapter 3. WarDriving with Handheld Devices and Direction Finding 94
Introduction 95
WarDriving with a Sharp Zaurus 95
WarDriving with MiniStumbler 110
Direction Finding with a Handheld Device 118
Summary 121
Solutions Fast Track 122
Frequently Asked Questions 123
Chapter 4. WarDriving and Penetration Testing with Windows 124
Introduction 125
WarDriving with NetStumbler 125
Running NetStumbler 130
Wireless Penetration Testing with Windows 139
Summary 146
Solutions Fast Track 147
Frequently Asked Questions 147
Chapter 5. WarDriving and Penetration Testing with Linux 150
Introduction 151
Preparing Your System to WarDrive 151
WarDriving with Linux and Kismet 162
Wireless Penetration Testing Using Linux 169
Summary 181
Solutions Fast Track 182
Frequently Asked Questions 183
Chapter 6. WarDriving and Wireless Penetration Testing with OS X 184
Introduction 185
WarDriving with KisMAC 185
Mapping WarDrives with KisMAC 193
WarDriving with KisMAC 197
Penetration Testing with OS X 201
Other OS X Tools for WarDriving and WLAN Testing 207
Summary 209
Solutions Fast Track 209
Frequently Asked Questions 211
Chapter 7. Wireless Penetration Testing Using a Bootable Linux Distribution 214
Introduction 215
Core Technologies 216
Open Source Tools 224
Case Study 239
Further Information 245
Solutions Fast Track 246
Frequently Asked Questions 248
Chapter 8. Mapping WarDrives 250
Introduction 251
Using the Global Positioning System Daemon with Kismet 251
Configuring Kismet for Mapping 257
Mapping WarDrives with GPSMAP 258
Mapping WarDrives with StumbVerter 262
Summary 275
Solutions Fast Track 276
Frequently Asked Questions 277
Chapter 9. Using Man-in-the-Middle Attacks to Your Advantage 278
Introduction 279
Hardware for the Attack—Antennas, Amps, WiFi Cards 281
Identify and Compromise the Target Access Point 286
The MITM Attack Laptop Configuration 288
Clone the Target Access Point and Begin the Attack 300
Summary 309
Solutions Fast Track 309
Frequently Asked Questions 312
Chapter 10. Using Custom Firmware for Wireless Penetration Testing 314
Choices for Modifying the Firmware on a Wireless Access Point 315
Installing OpenWRT on a Linksys WRT54G 316
Configuring and Understanding the OpenWKT Network Interfaces 327
Installing and Managing Software Packages for OpenWRT 329
Enumeration and Scanning from the WKT54G 333
Installation and Configuration of a Kismet Drone 337
Installing Aircrack to Crack a WEP Key 341
Summary 345
Solutions Fast Track 346
Frequently Asked Questions 349
Chapter 11. Wireless Video Testing 350
Introduction 351
Wireless Video Technologies 352
Tools for Detection 358
Summary 370
Solutions Fast Track 370
Frequently Asked Questions 372
Appendix A. Solutions Fast Track 374
Appendix B. Device Driver Auditing 392
Introduction 393
Why Should You Care 394
What is a Device Driver? 397
Summary 414
Index 416
Syngress: The Definition of a Serious Security Library 432
Erscheint lt. Verlag | 1.11.2007 |
---|---|
Sprache | englisch |
Themenwelt | Sachbuch/Ratgeber |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Wirtschaft ► Betriebswirtschaft / Management | |
ISBN-10 | 0-08-052077-4 / 0080520774 |
ISBN-13 | 978-0-08-052077-3 / 9780080520773 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich