| < Day Day Up > |
|
warchalking described, 5
WarDialing, 3, 32
WarDriver, term described, 4
WarDrives, mapping with DiGLE, 232–240
WarDriving
additional radio frequency equipment, 96–104
laptop setup, 8–9
maps. See maps
misconceptions about, 4–6
organized. See organized WarDriving
origins of, 2–4, 32
setups, 104–111
tools for, 7–24
truth about, 6–7
using for security purposes, 31
using Kismet, 200–207, 208, 210
worldwide. See WorldWide WarDrive
WarFlying, 3
WarGames (movie), 3, 32
WarGlue, 149, 287
WarKizniz program, 288
WarWalking, 3, 106–107
Weak Initialization Vectors (IVs), 212
“Weaknesses of the Key Scheduling Algorithm” (Fluhrer, Mantin, Shamir), 336
Web sites
Active State, 340, 417
Black Alchemy, 26
Church of WiFi (CoWF), 287
Enterprise Wireless Gateways (EWGs), 418
GPS data cable, 103
IEEE standards, 39, 431
Kismet, 35, 247
MAC, vendor codes, 75
map projections, 217
MapBlast, 272
Microsoft Knowledge Base, 94
MiniStumbler, 112
NetStumbler, 6, 35, 112
NetStumbler, MiniStumbler download, 45
Network University, 478
pcmcia-cs download, 123
PKI information, 457
Reef Edge, 404
Reef Edge Tech Zone, 406
Rob Flickenger’s antenna guide, 20
Seattle Wireless, 15
Security Tribe, 264
Shmoo Group, 155
Sourceforge, 337
StumbVerter download, 219
Syngress Publishing, 16
VisualGPS freeware, 103
WEPCrack, 340
WiGLE.net, 233
Wireless Central, 34
wireless discovery and attack tools, 352
WorldWide WarDrives, 313
writing custom scripts, 88–89
WEP (Wired Equivalency Privacy), 76
WEP encrypted networks
attacking, 336–340
LEAP and, 431
WEP node, warchalking symbol for, 6
WEPCrack, 212, 335, 340–345
which command, 185
WHOIS queries, 81
Wi-Scan file format
converting WarDriving data to, 272–279
exporting NetStumbler data, 109
WiFi maps, online mapping engine, 242
WiGLE
DiGLE product. See DiGLE
Rule, 306
Windows
attacking WEP with WEPCrack on, 340–345
attacking wireless networks in, 316–323
Cygwin installation, 340
defeating MAC address filtering in, 326–330
disabling TCP/IP stack in, 26–28
and NetStumbler, 38–39
Windows 95, 98, and NetStumbler, 43
Windows 2000
accessing wireless networks in, 321–323
configuring wireless security for clients, 384–385
and NetStumbler, 43
preparing for use with Linksys WRV54G, 420–428
using cracked key in, 334–345
Windows Active Directory domain authentication, 446–449
Windows CE
disabling TCP/IP stack in, 28–30
WarDriving setup, 33
Windows ME, 95
Windows NT and NetStumbler, 43
Windows Script Components, 87
Windows Script Host, 87
Windows XP
accessing wireless networks in, 317
configuring wireless clients for WPA, 402–404
configuring wireless interface for 802.1X authentication, 471–474
configuring wireless security for clients, 382–384
preparing for use with Linksys WRV54G, 420–428
running NetStumbler on, 74
using cracked key in, 331–334
WINIPCFG command, 95
Wired Equivalency Privacy (WEP), 76, 321
access points indicator (StumbVerter), 230–231
D-Link DI-624 AirPlus router, 376–379
enabling for BEFW11SR, 367–368
enabling for Linksys WAP11, 360–363
enabling for WRT54G, 372–373
improving security of, 449
vulnerability to attack, 392
and WPA, 396
wireless access points
attack potential of, 25
generating fake, 26
wireless bridges, 387
wireless cards
checking for monitor mode, 153
finding MAC address of, 364–364
Kismet, supported, 148
and NetStumbler, 73
Prism 2 chipset-based, 159
putting in monitor mode, 152
selecting for AirSnort installation, 338
Wireless Central NICs, 34
Wireless Client Manager, 74, 317, 322
wireless clients (Windows XP), configuring for WPA, 402–404
wireless Ethernet cards and NetStumbler, 41
wireless gateways, implementing with Reef Edge Dolphin, 404–11-0, 476
Wireless Geographic Logging Engine. See WiGLE
wireless local area networks. See WLANs
wireless network security
BEFW11SR 802.11b AP/router, 364–370
D-Link DI-624 AirPlus 2.4GHz Xtreme G Wireless Router with 4-Port Switch, 376–382
enabling on Linksyn WAP11 802.11b AP, 356–364
introduction to, 356
WRT54G 802.11b/g AP/router security, 370–375
wireless networks
802.11b, 802.11g cards, 10
basic security measures, 390
corporate and SOHO, 475
frequency of WEP key changes, 392
gateways, 405–406
man-in-the-middle attacks on, 333–336
modifying, hijacking, 334–335
NetStumbler data capture, 53
NICs. See NICs
security. See wireless network security
vulnerability to attack, 316
and WarDriving, 2–3
wireless NICs, NetStumbler, MiniStumbler support, 66
Wireless Zero Configuration (WZC) service, 74, 318
wireless.conf file, editing, 346
wlan-ng drivers, downloading, installing, 134–139, 159–166, 175
WLAN detection, active vs. passive, 40
WLANs
described, 38
Infrastructure mode, 110–111
WorldWide WarDrive
1, 262–269
2, 269–281
3, 281–301
coins, 299, 300
data set availability, 313
future of, 308–309
signing up for, 313
WPA-PSK authentication, 397
WPA (WiFi Protected Access)
attacking encrypted networks, 348
implementing, 396–404, 476
and wireless security, 11
NetStumbler readings, 76–77
WRT54G 802.11b/g AP/router security, 370–375
| < Day Day Up > |
|