WarDriving: Drive, Detect, Defend: A Guide to Wireless Security Paperback – Apr 9 2004
|New from||Used from|
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
About the Author
Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.
Top Customer Reviews
The first section of the book covers setting up both a laptop and a PDA for WarDriving purposes. This includes important general concepts like antenna types and their advantages and disadvantages, and connecting antenna to a wireless NIC. It also includes very specific information like specific NIC cards that work well and are conducive to the connection of external antennas and the like.
Once your hardware is set up you have to turn your attention to appropriate software. The authors detail both Windows and Linux software (free and commercial products) available to discover access points. It includes how to use NetStumbler, MiniStumbler, and Kismet to locate wireless LANs, the various options, and how to interpret the results. These are very detailed chapters and explain both the concepts and actual product use very well. Each of these chapters ends with additional software available to actually map the access points.
The final section of the book covers the details of attacking wireless networks.Read more ›
It takes two seperate chapters: one on installing the Windows utility Netstumbler (with pages and pages of screen shots, when a simple "click on the icon" would do), and one on using - not "advanced options" or anything, just using - Netstumbler. Similarly, three whole chapters are dedicated to the excruciating details of installation and use of the Linux tool Kismet, but again, nothing which couldn't be found in the README files or on the website which hosts the utility. They have a chapter on how to convert Kismet and Netstumbler logfiles to maps: if you already know about Stumbverter, WiGLE, and DiGLE (or can use Google), there's nothing new here. The authors pine on for a chapter about the wardrives that they've organized. If you've ever listened to your grandparents talk about the war, it's a lot like that. Then, they have a chapter on WiFi "attacks" - if you know how to manually set your SSID and MAC, and if you've ever even heard of Airsnort, you probably won't need this nontechnical, sub-script-kiddie, Windows screen-shot-laden chapter.
If you're interested in war driving, or if you're interested in Wi-Fi security, then you're probably already conversant with the tools covered in this book. There is no real technical depth, as this book is written to a "manager's level" of technical competence. ("Click OK to continue.") Their chapter on Wi-Fi network defense essentially boils down to "change default SSID" and "use WEP"; there's a couple of pages on VPN, firewalls, and using authentication, but again, nothing to justify the purchase price of this book.
Most recent customer reviews
If you are looking for something to help you break into other peoples wireless networks, look somewhere else. Read morePublished on May 22 2004 by James Norton
WarDriving is a (sub)cultural phenomenon that has emerged with the rapid growth in WiFi networks. As these have increasingly been adopted by the great unwashed, the vendors have... Read morePublished on May 7 2004 by W Boudville
This is a great book for Wi-Fi enthusiasts, and people who want to secure their wireless networks. Not only does it have a chapter on wireless security, the entire book is a guide... Read morePublished on April 30 2004 by Jack D. Herrington
I can't stress how great this book is! I am not a Linux guru but had heard that Kismet would help me find more access points. Read morePublished on April 30 2004
Individuals who are interested in searching out wireless access points and defending their own wireless networks against unauthorized use. Read more
If you want to learn how to wardrive using Kismet or NetStumbler (and variants), "WarDriving" is for you. Read morePublished on April 27 2004 by Richard Bejtlich
This book is one of the top 2 books that I've ever read, it was well thought out and put together. Anyone even remotely thinking about wireless MUST read this book before they... Read morePublished on April 20 2004 by John Kleinschmidt
This book is an excellent resource for Wireless Security Concerns. Wireless networks are growing by leaps and bounds and 75% of the are insecure. Read morePublished on April 20 2004
Look for similar items by category
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Programming > Languages & Tools
- Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Software Development
- Books > Computers & Technology > Software
- Books > Textbooks > Computer Science & Information Systems > Software Design & Engineering