| | Copyright |
| | Credits |
| | | About the Author |
| | | Contributors |
| | | Acknowledgments |
|
| | Foreword |
| | Preface |
| | | Why Wireless Hacks? |
| | | How to Use This Book |
| | | How This Book Is Organized |
| | | Conventions Used in This Book |
| | | How to Contact Us |
|
| | Chapter 1. The Standards |
| | | Section 1.1. Hacks #1-12 |
| | | Hack 1. 802.11: The Mother of All IEEE Wireless Ethernet |
| | | Hack 2. 802.11a: The Betamax of the 802.11 Family |
| | | Hack 3. 802.11b: The De Facto Standard |
| | | Hack 4. 802.11g: Like 802.11b, only Faster |
| | | Hack 5. 802.16: Long Distance Wireless Infrastructure |
| | | Hack 6. Bluetooth: Cable Replacement for Devices |
| | | Hack 7. 900 MHz: Low Speed, Better Coverage |
| | | Hack 8. CDPD, 1xRTT, and GPRS: Cellular Data Networks |
| | | Hack 9. FRS and GMRS: Super Walkie-Talkies |
| | | Hack 10. 802.1x: Port Security for Network Communications |
| | | Hack 11. HPNA and Powerline Ethernet |
| | | Hack 12. BSS Versus IBSS |
|
| | Chapter 2. Bluetooth and Mobile Data |
| | | Section 2.1. Hacks #13-19 |
| | | Hack 13. Remote Control OS X with a Sony Ericsson Phone |
| | | Hack 14. SMS with a Real Keyboard |
| | | Hack 15. Photo Blog Automatically with the Nokia 3650 |
| | | Hack 16. Using Bluetooth with Linux |
| | | Hack 17. Bluetooth to GPRS in Linux |
| | | Hack 18. Bluetooth File Transfers in Linux |
| | | Hack 19. Controlling XMMS with Bluetooth |
|
| | Chapter 3. Network Monitoring |
| | | Section 3.1. Hacks #20-42 |
| | | Hack 20. Find All Available Wireless Networks |
| | | Hack 21. Network Discovery Using NetStumbler |
| | | Hack 22. Network Detection on Mac OS X |
| | | Hack 23. Detecting Networks Using Handheld PCs |
| | | Hack 24. Passive Scanning with KisMAC |
| | | Hack 25. Establishing Connectivity |
| | | Hack 26. Quickly Poll Wireless Clients with ping |
| | | Hack 27. Finding Radio Manufacturers by MAC Address |
| | | Hack 28. Rendezvous Service Advertisements in Linux |
| | | Hack 29. Advertising Arbitrary Rendezvous Services in OS X |
| | | Hack 30. "Brought to you by" Rendezvous Ad Redirector |
| | | Hack 31. Detecting Networks with Kismet |
| | | Hack 32. Running Kismet on Mac OS X |
| | | Hack 33. Link Monitoring in Linux with Wavemon |
| | | Hack 34. Historical Link State Monitoring |
| | | Hack 35. EtherPEG and DriftNet |
| | | Hack 36. Estimating Network Performance |
| | | Hack 37. Watching Traffic with tcpdump |
| | | Hack 38. Visual Traffic Analysis with Ethereal |
| | | Hack 39. Tracking 802.11 Frames in Ethereal |
| | | Hack 40. Interrogating the Network with nmap |
| | | Hack 41. Network Monitoring with ngrep |
| | | Hack 42. Running ntop for Real-Time Network Stats |
|
| | Chapter 4. Hardware Hacks |
| | | Section 4.1. Hacks #43-69 |
| | | Hack 43. Add-on Laptop Antennas |
| | | Hack 44. Increasing the Range of a Titanium PowerBook |
| | | Hack 45. WET11 Upgrades |
| | | Hack 46. AirPort Linux |
| | | Hack 47. Java Configurator for AirPort APs |
| | | Hack 48. Apple Software Base Station |
| | | Hack 49. Adding an Antenna to the AirPort |
| | | Hack 50. The NoCat Night Light |
| | | Hack 51. Do-It-Yourself Access Point Hardware |
| | | Hack 52. Compact Flash Hard Drive |
| | | Hack 53. Pebble |
| | | Hack 54. Tunneling: IPIP Encapsulation |
| | | Hack 55. Tunneling: GRE Encapsulation |
| | | Hack 56. Running Your Own Top-Level Domain |
| | | Hack 57. Getting Started with Host AP |
| | | Hack 58. Make Host AP a Layer 2 Bridge |
| | | Hack 59. Bridging with a Firewall |
| | | Hack 60. MAC Filtering with Host AP |
| | | Hack 61. Hermes AP |
| | | Hack 62. Microwave Cabling Guide |
| | | Hack 63. Microwave Connector Reference |
| | | Hack 64. Antenna Guide |
| | | Hack 65. Client Capability Reference Chart |
| | | Hack 66. Pigtails |
| | | Hack 67. 802.11 Hardware Suppliers |
| | | Hack 68. Home-Brew Power over Ethernet |
| | | Hack 69. Cheap but Effective Roof Mounts |
|
| | Chapter 5. Do-It-Yourself Antennas |
| | | Section 5.1. Hacks #70-79 |
| | | Hack 70. Deep Dish Cylindrical Parabolic Reflector |
| | | Hack 71. "Spider" Omni |
| | | Hack 72. Pringles Can Waveguide |
| | | Hack 73. Pirouette Can Waveguide |
| | | Hack 74. Primestar Dish with Waveguide Feed |
| | | Hack 75. BiQuad Feed for Primestar Dish |
| | | Hack 76. Cut Cable Omni Antenna |
| | | Hack 77. Slotted Waveguides |
| | | Hack 78. The Passive Repeater |
| | | Hack 79. Determining Antenna Gain |
|
| | Chapter 6. Long Distance Links |
| | | Section 6.1. Hacks #80-85 |
| | | Hack 80. Establishing Line of Sight |
| | | Hack 81. Calculating the Link Budget |
| | | Hack 82. Aligning Antennas at Long Distances |
| | | Hack 83. Slow Down to Speed Up |
| | | Hack 84. Taking Advantage of Antenna Polarization |
| | | Hack 85. Map the Wireless Landscape with NoCat Maps |
|
| | Chapter 7. Wireless Security |
| | | Section 7.1. Hacks #86-100 |
| | | Hack 86. Making the Best of WEP |
| | | Hack 87. Dispel the Myth of Wireless Security |
| | | Hack 88. Cracking WEP with AirSnort: The Easy Way |
| | | Hack 89. NoCatAuth Captive Portal |
| | | Hack 90. NoCatSplash and Cheshire |
| | | Hack 91. Squid Proxy over SSH |
| | | Hack 92. SSH SOCKS 4 Proxy |
| | | Hack 93. Forwarding Ports over SSH |
| | | Hack 94. Quick Logins with SSH Client Keys |
| | | Hack 95. "Turbo-Mode" SSH Logins |
| | | Hack 96. OpenSSH on Windows Using Cygwin |
| | | Hack 97. Location Support for Tunnels in OS X |
| | | Hack 98. Using vtun over SSH |
| | | Hack 99. Automatic vtund.conf Generator |
| | | Hack 100. Tracking Wireless Users with arpwatch |
|
| | Appendix A. Deep Dish Parabolic Reflector Template |
| | Colophon |
| | Index |