Frequently Asked Questions

 < Day Day Up > 



The following Frequently Asked Questions, answered by the authors of this book, are designed to both measure your understanding of the concepts presented in this chapter and to assist you with real-life implementation of these concepts. To have your questions about this chapter answered by the author, browse to www.syngress.com/solutions and click on the “Ask the Author” form. You will also gain access to thousands of other FAQs at ITFAQnet.com.

1. 

What wireless cards will work with Kismet?

according to the kismet web site ( www.kismetwireless.net ), the following cards and chipsets are supported: cisco 1. aironet 340 2. aironet 350 prism 2 1. linksys 2. d-link 3. zoom 4. demarctech 5. microsoft 6. many others orinoco 1. lucent orinoco-based cards such as the wavelan 2. airport airport * airport cards under mac os x using the viha drivers acx100 * dlink 650+

2. 

Will Kismet work on a Macintosh?

yes. kismet will work on linux, bsd-based systems, mac os x, and can even be used on windows systems using cygwin.

3. 

I like to use Stumbverter to map my WarDrives. Is there a way to convert my Kismet logs to a format that I can feed into Stumbverter?

yes. using warglue ( www.lostboxen.net/warglue/ ), you can convert your kismet logs to netstumbler format and then export it to summary for use with stumbverter.

4. 

I like WarDriving with my Personal Digital Assistant instead of a laptop. Will Kismet work with my PDA?

hewlett packard or compaq ipaqs that have been set up to dual boot linux can run kismet. also, the sharp zaurus runs a modified linux kernel and there are kismet packages available that will work with it.

5. 

If people don’t broadcast their SSID, isn’t that a clue that they don’t want their access points to be found? Why would I want to use a product like Kismet that seems to violate that?

there are several answers to this question. first, in order to gain a true statistical analysis of wireless networks that are currently deployed, you need to find all of them, not just those that are broadcasting ssid. second, many security professionals or network administrators can use kismet to detect rogue access points that have been placed on their network in stealth mode. if they only relied on netstumbler or other active scanners, they wouldn t be aware of these rogue access points that could provide an unauthorized entry point into their network.

6. 

What is the difference between an active scanner and a passive scanner?

at its most basic, an active scanner sends out a request beacon asking if there are any wireless networks in range. if an access point is configured to respond to these beacons, the access point is discovered. a passive scanner doesn t transmit any traffic. it simply listens for any traffic that is being broadcast. if this traffic is present, a passive scanner has discovered the access point.

7. 

Kismet doesn’t appear to work with any 802.11g cards. Why is this?

kismet is primarily a linux program. currently, very few 802.11g card manufacturers provide linux drivers for their cards. without a driver, and the ability to place the card in monitor mode, kismet will not work.

8. 

Is Fedora any more difficult to use than other distributions for WarDriving?

actually, no it s not. the key is knowing how to get the computer loaded and configured correctly from the start. if you ve been using another distribution of linux up to this point, you may run into the normal problems associated with changing your operating system.

9. 

What is the most common issue with using Fedora for WarDriving?

the biggest issue is the installation process of the operating system itself. fedora gives you multiple options for installing the operating system. we recommend that, unless you re a veteran user of fedora, you do a full installation so that all the right components are in place. this will save you a lot of hassle when you re installing the wireless network drivers and kismet.

10. 

Is there someplace I can go to discuss Kismet with other Kismet users?

yes, the kismet forums ( www.kismetwireless.net/forum.php ) are a collection of discussion areas for kismet users. you can also subscribe to the kismet mailing list by sending an e-mail to wireless-subscribe@kismetwireless.net. there is also a lot of kismet discussion on the wardriving mailing list. to subscribe, go to http://mailsrv.dis.org/mailman/listinfo/wardriving.

Answers

1. 

According to the Kismet Web site (www.kismetwireless.net), the following cards and chipsets are supported:

Cisco

  1. Aironet 340

  2. Aironet 350

Prism 2

  1. Linksys

  2. D-Link

  3. Zoom

  4. Demarctech

  5. Microsoft

  6. Many others

ORiNOCO

  1. Lucent ORiNOCO-based cards such as the WaveLAN

  2. Airport

AIRPORT

  • Airport cards under Mac OS X using the Viha drivers

ACX100

  • Dlink 650+

2. 

Yes. Kismet will work on Linux, BSD-based systems, Mac OS X, and can even be used on Windows systems using Cygwin.

3. 

Yes. Using WarGlue (www.lostboxen.net/warglue/), you can convert your Kismet logs to NetStumbler format and then export it to Summary for use with Stumbverter.

4. 

Hewlett Packard or Compaq iPAQs that have been set up to dual boot Linux can run Kismet. Also, the Sharp Zaurus runs a modified Linux kernel and there are Kismet packages available that will work with it.

5. 

There are several answers to this question. First, in order to gain a true statistical analysis of wireless networks that are currently deployed, you need to find all of them, not just those that are broadcasting SSID. Second, many security professionals or network administrators can use Kismet to detect rogue access points that have been placed on their network in stealth mode. If they only relied on NetStumbler or other active scanners, they wouldn’t be aware of these rogue access points that could provide an unauthorized entry point into their network.

6. 

At its most basic, an active scanner sends out a request beacon “asking” if there are any wireless networks in range. If an access point is configured to respond to these beacons, the access point is discovered. A passive scanner doesn’t transmit any traffic. It simply “listens” for any traffic that is being broadcast. If this traffic is present, a passive scanner has discovered the access point.

7. 

Kismet is primarily a Linux program. Currently, very few 802.11g card manufacturers provide Linux drivers for their cards. Without a driver, and the ability to place the card in monitor mode, Kismet will not work.

8. 

Actually, no it’s not. The key is knowing how to get the computer loaded and configured correctly from the start. If you’ve been using another distribution of Linux up to this point, you may run into the normal problems associated with changing your operating system.

9. 

The biggest issue is the installation process of the operating system itself. Fedora gives you multiple options for installing the operating system. We recommend that, unless you’re a veteran user of Fedora, you do a full installation so that all the right components are in place. This will save you a lot of hassle when you’re installing the wireless network drivers and Kismet.

10. 

Yes, the Kismet Forums (www.kismetwireless.net/forum.php) are a collection of discussion areas for Kismet users. You can also subscribe to the Kismet mailing list by sending an e-mail to wireless-subscribe@kismetwireless.net. There is also a lot of Kismet discussion on the WarDriving mailing list. To subscribe, go to http://mailsrv.dis.org/mailman/listinfo/wardriving.



 < Day Day Up > 



WarDriving(c) Drive, Detect, Defend(c) A Guide to Wireless Security
Special Edition Using Macromedia Studio 8
ISBN: N/A
EAN: 2147483647
Year: 2006
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net