installing systems with default settings, and social engineering. Chapter 6 talks about various physical security ailments that can leave your network open to attack.
Chapter 7 covers common vulnerabilities found in wireless-client systems associated with wireless PC Cards, operating system weaknesses, and personal firewalls — any of which can make or break the security of your wireless network. In Chapter 8, we dig a little deeper into the “people problems” covered in Chapter 5 — in particular, what can happen when people don’t change the default settings (arrgh). We talk about SSIDs, passwords, IP addresses, and more, so be sure to check out this vital information on an often-overlooked wireless weakness. In Chapter 9, we cover the basics of war driving including how to use stumbling software and a GPS system to map out your wireless network. We’ll not only cover the tools and techniques, but also what you can do about it — and that includes doing it ethically before somebody does it maliciously.
Part III: Advanced Wi-Fi Hacks
In Chapter 10, we continue our coverage on war driving and introduce you to some more advanced hacking tools, techniques, and countermeasures. In Chapter 11, we go into some depth about unapproved wireless devices — we lay out why they’re an issue, and talk about the various technical problems associated with rogue wireless systems on your network. We show you tests you can run and give you tips on how you can prevent random systems from jeopardizing your airwaves. In Chapter 12, we look at the various ways your communications and network protocols can cause problems — whether that’s with MAC address spoofing, Simple Network Management Protocol (SNMP) weaknesses, man-in-the-middle vulnerabilities, and Address 04_597302_intro.qxd 8/4/05 7:27 PM Page 5
Introduction
5
Resolution Protocol (ARP) poisoning. In Chapter 13, we cover denial-of-service attacks including jamming, disassociation, and deauthentication attacks that can be performed against wireless networks and how to defend against them.
In Chapter 14, you get a handle on how to crack WEP encryption; Chapter 15
outlines various attacks against wireless-network authentication systems. In these chapters, we not only show you how to test your wireless systems for these vulnerabilities but also make suggestions to help you secure your systems from these attacks.
Part IV: The Part of Tens
This part contains tips to help ensure the success of your ethical-hacking program. You find out our listing of ten wireless-hacking tools. In addition, we include the top ten wireless-security testing mistakes, along with ten tips on following up after you’re done testing. Our aim is to help ensure the ongoing security of your wireless systems and the continuing success of your ethical hacking program.
Part V: Appendixes
This part includes an appendix that covers ethical wireless-network hacking resources and a glossary of acronyms.
Icons Used in This Book
This icon points out technical information that is (although interesting) not absolutely vital to your understanding of the topic being discussed. Yet.
This icon points out information that is worth committing to memory.
This icon points out information that could have a negative impact on your ethical hacking efforts — so pay close attention.
This icon refers to advice that can help highlight or clarify an important point.
04_597302_intro.qxd 8/4/05 7:27 PM Page 6
6
Hacking Wireless Networks For Dummies
Where to Go from Here
The more you know about how the bad guys work, how your wireless networks are exposed to the world, and how to test your wireless systems for vulnerabilities, the more secure your information will be. This book provides a solid foundation for developing and maintaining a professional ethical-hacking program to keep your wireless systems in check.
Remember that there’s no one best way to test your systems because everyone’s network is