Index_L

 < Day Day Up > 



L

laptops

disabling connection to network, 26

running NetStumbler copy on, 73

viewing .ns1 files on, 68

WarDriving setup, 8–9

latitude and longitude, 218

LEAP. See Lightweight Extensible Authentication Protocol

legality

of accessing wireless networks, 352

of attacking networks, 316

of WarDriving, 7, 93–94

Lightweight Extensible Authentication Protocol (LEAP)

configuring, 440–446

implementing RADIUS with, 430–449, 477

review of, 449

vulnerability to attack, 353, 434

line of sight (LOS), 17, 60, 102

Linksys, 7, 14

Linksys WAP11 802.11b AP security, 356–364

Linksys WRV54G VPN broadband router

configuring for WPA, 399–402

enabling VPN on, 428–430

implementing VPN on, 419–430, 476

Linux

attacking WEP with AirSnort on, 336

attacking wireless networks in, 324–325

configuring wireless security for clients, 385–387

defeating MAC address filtering in, 330–332

drivers, 150

Fedora. See Fedora Linux

Kismet. See Kismet

using cracked key in, 345

WarDriving configuration, 33

locating

beacons, 40

cloaked access points, 332–333

WLANs, 38

logging

Kismet files, 212

removing fake access points from, 26

logins/logouts, Dolphin utility, 417

longitude and latitude, 218



 < Day Day Up > 



WarDriving(c) Drive, Detect, Defend(c) A Guide to Wireless Security
Special Edition Using Macromedia Studio 8
ISBN: N/A
EAN: 2147483647
Year: 2006
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net