Index_W

 < Day Day Up > 



W

warchalking described, 5

WarDialing, 3, 32

WarDriver, term described, 4

WarDrives, mapping with DiGLE, 232–240

WarDriving

additional radio frequency equipment, 96–104

laptop setup, 8–9

maps. See maps

misconceptions about, 4–6

organized. See organized WarDriving

origins of, 2–4, 32

setups, 104–111

tools for, 7–24

truth about, 6–7

using for security purposes, 31

using Kismet, 200–207, 208, 210

worldwide. See WorldWide WarDrive

WarFlying, 3

WarGames (movie), 3, 32

WarGlue, 149, 287

WarKizniz program, 288

WarWalking, 3, 106–107

Weak Initialization Vectors (IVs), 212

“Weaknesses of the Key Scheduling Algorithm” (Fluhrer, Mantin, Shamir), 336

Web sites

Active State, 340, 417

Black Alchemy, 26

Church of WiFi (CoWF), 287

Enterprise Wireless Gateways (EWGs), 418

GPS data cable, 103

IEEE standards, 39, 431

Kismet, 35, 247

MAC, vendor codes, 75

map projections, 217

MapBlast, 272

Microsoft Knowledge Base, 94

MiniStumbler, 112

NetStumbler, 6, 35, 112

NetStumbler, MiniStumbler download, 45

Network University, 478

pcmcia-cs download, 123

PKI information, 457

Reef Edge, 404

Reef Edge Tech Zone, 406

Rob Flickenger’s antenna guide, 20

Seattle Wireless, 15

Security Tribe, 264

Shmoo Group, 155

Sourceforge, 337

StumbVerter download, 219

Syngress Publishing, 16

VisualGPS freeware, 103

WEPCrack, 340

WiGLE.net, 233

Wireless Central, 34

wireless discovery and attack tools, 352

WorldWide WarDrives, 313

writing custom scripts, 88–89

WEP (Wired Equivalency Privacy), 76

WEP encrypted networks

attacking, 336–340

LEAP and, 431

WEP node, warchalking symbol for, 6

WEPCrack, 212, 335, 340–345

which command, 185

WHOIS queries, 81

Wi-Scan file format

converting WarDriving data to, 272–279

exporting NetStumbler data, 109

WiFi maps, online mapping engine, 242

WiGLE

DiGLE product. See DiGLE

Rule, 306

Windows

attacking WEP with WEPCrack on, 340–345

attacking wireless networks in, 316–323

Cygwin installation, 340

defeating MAC address filtering in, 326–330

disabling TCP/IP stack in, 26–28

and NetStumbler, 38–39

Windows 95, 98, and NetStumbler, 43

Windows 2000

accessing wireless networks in, 321–323

configuring wireless security for clients, 384–385

and NetStumbler, 43

preparing for use with Linksys WRV54G, 420–428

using cracked key in, 334–345

Windows Active Directory domain authentication, 446–449

Windows CE

disabling TCP/IP stack in, 28–30

WarDriving setup, 33

Windows ME, 95

Windows NT and NetStumbler, 43

Windows Script Components, 87

Windows Script Host, 87

Windows XP

accessing wireless networks in, 317

configuring wireless clients for WPA, 402–404

configuring wireless interface for 802.1X authentication, 471–474

configuring wireless security for clients, 382–384

preparing for use with Linksys WRV54G, 420–428

running NetStumbler on, 74

using cracked key in, 331–334

WINIPCFG command, 95

Wired Equivalency Privacy (WEP), 76, 321

access points indicator (StumbVerter), 230–231

D-Link DI-624 AirPlus router, 376–379

enabling for BEFW11SR, 367–368

enabling for Linksys WAP11, 360–363

enabling for WRT54G, 372–373

improving security of, 449

vulnerability to attack, 392

and WPA, 396

wireless access points

attack potential of, 25

generating fake, 26

wireless bridges, 387

wireless cards

checking for monitor mode, 153

finding MAC address of, 364–364

Kismet, supported, 148

and NetStumbler, 73

Prism 2 chipset-based, 159

putting in monitor mode, 152

selecting for AirSnort installation, 338

Wireless Central NICs, 34

Wireless Client Manager, 74, 317, 322

wireless clients (Windows XP), configuring for WPA, 402–404

wireless Ethernet cards and NetStumbler, 41

wireless gateways, implementing with Reef Edge Dolphin, 404–11-0, 476

Wireless Geographic Logging Engine. See WiGLE

wireless local area networks. See WLANs

wireless network security

BEFW11SR 802.11b AP/router, 364–370

D-Link DI-624 AirPlus 2.4GHz Xtreme G Wireless Router with 4-Port Switch, 376–382

enabling on Linksyn WAP11 802.11b AP, 356–364

introduction to, 356

WRT54G 802.11b/g AP/router security, 370–375

wireless networks

802.11b, 802.11g cards, 10

basic security measures, 390

corporate and SOHO, 475

frequency of WEP key changes, 392

gateways, 405–406

man-in-the-middle attacks on, 333–336

modifying, hijacking, 334–335

NetStumbler data capture, 53

NICs. See NICs

security. See wireless network security

vulnerability to attack, 316

and WarDriving, 2–3

wireless NICs, NetStumbler, MiniStumbler support, 66

Wireless Zero Configuration (WZC) service, 74, 318

wireless.conf file, editing, 346

wlan-ng drivers, downloading, installing, 134–139, 159–166, 175

WLAN detection, active vs. passive, 40

WLANs

described, 38

Infrastructure mode, 110–111

WorldWide WarDrive

1, 262–269

2, 269–281

3, 281–301

coins, 299, 300

data set availability, 313

future of, 308–309

signing up for, 313

WPA-PSK authentication, 397

WPA (WiFi Protected Access)

attacking encrypted networks, 348

implementing, 396–404, 476

and wireless security, 11

NetStumbler readings, 76–77

WRT54G 802.11b/g AP/router security, 370–375



 < Day Day Up > 



WarDriving(c) Drive, Detect, Defend(c) A Guide to Wireless Security
Special Edition Using Macromedia Studio 8
ISBN: N/A
EAN: 2147483647
Year: 2006
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net