- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security Paperback – Mar 26 2004
|New from||Used from|
Special Offers and Product Promotions
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
About the Author
Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.
Inside This Book(Learn More)
Top Customer Reviews
The first section of the book covers setting up both a laptop and a PDA for WarDriving purposes. This includes important general concepts like antenna types and their advantages and disadvantages, and connecting antenna to a wireless NIC. It also includes very specific information like specific NIC cards that work well and are conducive to the connection of external antennas and the like.
Once your hardware is set up you have to turn your attention to appropriate software. The authors detail both Windows and Linux software (free and commercial products) available to discover access points. It includes how to use NetStumbler, MiniStumbler, and Kismet to locate wireless LANs, the various options, and how to interpret the results. These are very detailed chapters and explain both the concepts and actual product use very well. Each of these chapters ends with additional software available to actually map the access points.
The final section of the book covers the details of attacking wireless networks.Read more ›
It takes two seperate chapters: one on installing the Windows utility Netstumbler (with pages and pages of screen shots, when a simple "click on the icon" would do), and one on using - not "advanced options" or anything, just using - Netstumbler. Similarly, three whole chapters are dedicated to the excruciating details of installation and use of the Linux tool Kismet, but again, nothing which couldn't be found in the README files or on the website which hosts the utility. They have a chapter on how to convert Kismet and Netstumbler logfiles to maps: if you already know about Stumbverter, WiGLE, and DiGLE (or can use Google), there's nothing new here. The authors pine on for a chapter about the wardrives that they've organized. If you've ever listened to your grandparents talk about the war, it's a lot like that. Then, they have a chapter on WiFi "attacks" - if you know how to manually set your SSID and MAC, and if you've ever even heard of Airsnort, you probably won't need this nontechnical, sub-script-kiddie, Windows screen-shot-laden chapter.
If you're interested in war driving, or if you're interested in Wi-Fi security, then you're probably already conversant with the tools covered in this book. There is no real technical depth, as this book is written to a "manager's level" of technical competence. ("Click OK to continue.") Their chapter on Wi-Fi network defense essentially boils down to "change default SSID" and "use WEP"; there's a couple of pages on VPN, firewalls, and using authentication, but again, nothing to justify the purchase price of this book.
This book has two audiences. The first is those who want to WarDrive. Here, you find all necessary nuts and bolts information about configuring your computer, be it running MS Windows or Linux. Plus descriptions of antennas. Enough to get you up and running, or driving, as the case probably is. You should find it quite facile, if you follow the book's guidelines.
The other audience is those of you running a WiFi net, or planning to. By squinting a little at the text, you get simple and effective advice on preventing unwanted access.
Did I say 2 audiences? There is a third, which may have some intersection with the others. Suppose you just want to learn more about WarDriving, perhaps out of pure curiosity. This book is ideal for that. The author is the organiser of the first 3 WWWarDrives. Well qualified to expound on this subject. The chapter on WWWarDrives will be good in later years, from a historical viewpoint.
As a bonus, Hurley "exposes" WarChalking. This is a meme that spread widely in 2002. Hurley claims that amongst actual WarDrivers, few actually do this. Basically, WarChalking is a cute, easy to understand idea, especially because it is so visual. Which undoubtedly helped the general media latch onto it and spread it.
Most recent customer reviews
If you are looking for something to help you break into other peoples wireless networks, look somewhere else. Read morePublished on May 22 2004 by James Norton
This is a great book for Wi-Fi enthusiasts, and people who want to secure their wireless networks. Not only does it have a chapter on wireless security, the entire book is a guide... Read morePublished on April 30 2004 by Jack D. Herrington
I can't stress how great this book is! I am not a Linux guru but had heard that Kismet would help me find more access points. Read morePublished on April 30 2004
Individuals who are interested in searching out wireless access points and defending their own wireless networks against unauthorized use. Read more
If you want to learn how to wardrive using Kismet or NetStumbler (and variants), "WarDriving" is for you. Read morePublished on April 27 2004 by Richard Bejtlich
Ok, I will admit it...I am a "button down" kind of guy. I manage my company's wireless network and I have one in my house as well. Read morePublished on April 23 2004 by Stephen Burton
This book is one of the top 2 books that I've ever read, it was well thought out and put together. Anyone even remotely thinking about wireless MUST read this book before they... Read morePublished on April 20 2004 by John Kleinschmidt
This book is an excellent resource for Wireless Security Concerns. Wireless networks are growing by leaps and bounds and 75% of the are insecure. Read morePublished on April 20 2004
Look for similar items by category
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Programming > Languages & Tools
- Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Software Development
- Books > Computers & Technology > Software
- Books > Textbooks > Computer Science & Information Systems > Software Design & Engineering