| < Day Day Up > |
|
laptops
disabling connection to network, 26
running NetStumbler copy on, 73
viewing .ns1 files on, 68
WarDriving setup, 8–9
latitude and longitude, 218
LEAP. See Lightweight Extensible Authentication Protocol
legality
of accessing wireless networks, 352
of attacking networks, 316
of WarDriving, 7, 93–94
Lightweight Extensible Authentication Protocol (LEAP)
configuring, 440–446
implementing RADIUS with, 430–449, 477
review of, 449
vulnerability to attack, 353, 434
line of sight (LOS), 17, 60, 102
Linksys, 7, 14
Linksys WAP11 802.11b AP security, 356–364
Linksys WRV54G VPN broadband router
configuring for WPA, 399–402
enabling VPN on, 428–430
implementing VPN on, 419–430, 476
Linux
attacking WEP with AirSnort on, 336
attacking wireless networks in, 324–325
configuring wireless security for clients, 385–387
defeating MAC address filtering in, 330–332
drivers, 150
Fedora. See Fedora Linux
Kismet. See Kismet
using cracked key in, 345
WarDriving configuration, 33
locating
beacons, 40
cloaked access points, 332–333
WLANs, 38
logging
Kismet files, 212
removing fake access points from, 26
logins/logouts, Dolphin utility, 417
longitude and latitude, 218
| < Day Day Up > |
|