You are previewing WarDriving and Wireless Penetration Testing.
O'Reilly logo
WarDriving and Wireless Penetration Testing

Book Description

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.

* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.

* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.

* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. VISIT US AT
  5. Copyright
  6. Acknowledgments
  7. Technical Editor and Lead Author
  8. Technical Editor and Contributing Author
  9. Contributing Authors
  10. Foreword Contributor
  11. Foreword
  12. Foreword v 1.0
  13. Chapter 1: Introduction to WarDriving and Penetration Testing
    1. Introduction
    2. WarDriving
    3. The Origins of WarDriving
    4. Tools of the Trade or “What Do I Need?”
    5. Putting It All Together
    6. Penetration Testing
    7. Tools for Penetration Testing
    8. Conclusion and What to Expect From this Book
    9. Solutions Fast Track
  14. Chapter 2: Understanding Antennas and Antenna Theory
    1. Introduction
    2. Terminology and Jargon
    3. Differences Between Antenna Types
    4. Other RF Devices
    5. Summary
    6. Solutions Fast Track
  15. Chapter 3: WarDriving With Handheld Devices and Direction Finding
    1. Introduction
    2. WarDriving with a Sharp Zaurus
    3. WarDriving with MiniStumbler
    4. Direction Finding with a Handheld Device
    5. Summary
    6. Solutions Fast Track
  16. Chapter 4: WarDriving and Penetration Testing with Windows
    1. Introduction
    2. WarDriving with NetStumbler
    3. Running NetStumbler
    4. Wireless Penetration Testing with Windows
    5. Summary
    6. Solutions Fast Track
  17. Chapter 5: WarDriving and Penetration Testing with Linux
    1. Introduction
    2. Preparing Your System to WarDrive
    3. WarDriving with Linux and Kismet
    4. Wireless Penetration Testing Using Linux
    5. Summary
    6. Solutions Fast Track
  18. Chapter 6: WarDriving and Wireless Penetration Testing with OS X
    1. Introduction
    2. WarDriving with KisMAC
    3. Penetration Testing with OS X
    4. Other OS X Tools for WarDriving and WLAN Testing
    5. Summary
    6. Solutions Fast Track
  19. Chapter 7: Wireless Penetration Testing Using a Bootable Linux Distribution
    1. Introduction
    2. Core Technologies
    3. Open Source Tools
    4. Case Study
    5. Further Information
    6. Solutions Fast Track
  20. Chapter 8: Mapping WarDrives
    1. Introduction
    2. Using the Global Positioning System Daemon with Kismet
    3. Configuring Kismet for Mapping
    4. Mapping WarDrives with GPSMAP
    5. Summary
    6. Solutions Fast Track
    7. Mapping WarDrives with GPSMap
  21. Chapter 9: Using Man-in-the-Middle Attacks to Your Advantage
    1. Introduction
    2. Hardware for the Attack—Antennas, Amps, WiFi Cards
    3. Identify and Compromise the Target Access Point
    4. The MITM Attack Laptop Configuration
    5. Clone the Target Access Point and Begin the Attack
    6. Summary
    7. Solutions Fast Track
  22. Chapter 10: Using Custom Firmware for Wireless Penetration Testing
    1. Choices for Modifying the Firmware on a Wireless Access Point
    2. Installing OpenWRT on a Linksys WRT54G
    3. Configuring and Understanding the OpenWRT Network Interfaces
    4. Installing and Managing Software Packages for OpenWRT
    5. Enumeration and Scanning from the WRT54G
    6. Installation and Configuration of a Kismet Drone
    7. Installing Aircrack to Crack a WEP Key
    8. Summary
    9. Solutions Fast Track
  23. Chapter 11: Wireless Video Testing
    1. Introduction
    2. Wireless Video Technologies
    3. Tools for Detection
    4. Summary
    5. Solutions Fast Track
  24. Appendix A: Solutions Fast Track
  25. Appendix B: Device Driver Auditing
  26. Index