Invia a Kindle o a un altro dispositivo

 
 
 

Prova gratis

Leggi gratuitamente l'inizio di questo eBook

Invia a Kindle o a un altro dispositivo

WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
 
Visualizza l'immagine in formato grande
 

WarDriving: Drive, Detect, Defend: A Guide to Wireless Security [Formato Kindle]

Chris Hurley

Prezzo edizione digitale: EUR 36,00 Cos'è?
Prezzo Copertina Ed. Cartacea: EUR 40,51
Prezzo Kindle: EUR 21,31 include IVA (dove applicabile) e il download wireless gratuito con Amazon Whispernet
Risparmi: EUR 19,20 (47%)

Applicazione di lettura per Kindle gratuita Grazie all'app Kindle GRATUITA per smartphone, tablet e computer, potrai leggere i libri Kindle, anche se non possiedi un dispositivo Kindle.

Per scaricare una app gratuita, inserisci l'indirizzo e-mail o il numero di cellulare.

Formati

Prezzo Amazon Nuovo a partire da Usato da
Formato Kindle EUR 21,31  
Copertina flessibile EUR 28,41  

Descrizione prodotto

Sinossi

The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.

* Provides the essential information needed to protect and secure wireless networks
* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks
* This is the first book to deal with the hot topic of WarDriving

L'autore

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

Dettagli prodotto

  • Formato: Formato Kindle
  • Dimensioni file: 18995 KB
  • Lunghezza stampa: 512
  • Editore: Syngress; 1st edizione (2 aprile 2004)
  • Venduto da: Amazon Media EU S.à r.l.
  • Lingua: Inglese
  • ASIN: B003YCQ8U2
  • Da testo a voce: Abilitato
  • X-Ray:
  • Word Wise: Non abilitato

Recensioni clienti

Non ci sono ancora recensioni di clienti su Amazon.it
5 stelle
4 stelle
3 stelle
2 stelle
1 stella
Le recensioni clienti più utili su Amazon.com (beta)
Amazon.com: 4.0 su 5 stelle  21 recensioni
99 di 108 persone hanno trovato utile la seguente recensione
1.0 su 5 stelle Who ARE these people giving 5 star reviews? 21 maggio 2004
Di Anthony Sutton - Pubblicato su Amazon.com
Formato:Copertina flessibile|Acquisto verificato
The short review of this book is that if you're interested enough in the subject to buy this book, then you're unlikely to find anything - and I mean ANYTHING - new in this book.
It takes two seperate chapters: one on installing the Windows utility Netstumbler (with pages and pages of screen shots, when a simple "click on the icon" would do), and one on using - not "advanced options" or anything, just using - Netstumbler. Similarly, three whole chapters are dedicated to the excruciating details of installation and use of the Linux tool Kismet, but again, nothing which couldn't be found in the README files or on the website which hosts the utility. They have a chapter on how to convert Kismet and Netstumbler logfiles to maps: if you already know about Stumbverter, WiGLE, and DiGLE (or can use Google), there's nothing new here. The authors pine on for a chapter about the wardrives that they've organized. If you've ever listened to your grandparents talk about the war, it's a lot like that. Then, they have a chapter on WiFi "attacks" - if you know how to manually set your SSID and MAC, and if you've ever even heard of Airsnort, you probably won't need this nontechnical, sub-script-kiddie, Windows screen-shot-laden chapter.
If you're interested in war driving, or if you're interested in Wi-Fi security, then you're probably already conversant with the tools covered in this book. There is no real technical depth, as this book is written to a "manager's level" of technical competence. ("Click OK to continue.") Their chapter on Wi-Fi network defense essentially boils down to "change default SSID" and "use WEP"; there's a couple of pages on VPN, firewalls, and using authentication, but again, nothing to justify the purchase price of this book.
9 di 11 persone hanno trovato utile la seguente recensione
3.0 su 5 stelle A decent book on a narrow but relevant topic 27 aprile 2004
Di Richard Bejtlich - Pubblicato su Amazon.com
Formato:Copertina flessibile
If you want to learn how to wardrive using Kismet or NetStumbler (and variants), "WarDriving" is for you. The book does a good job debunking certain myths, such as the prevalence of "warchalking" or the widespread use of "Pringles can antennas." I found the practical advice, like disabling the TCP/IP stack on Windows prior to wardriving, especially helpful. The authors constantly advocate a professional mindset towards wardriving and do not suggest unethical use of insecure wireless networks.

"WarDriving" suffers from several drawbacks. The book was written by multiple authors, and the lead author failed to remove redundant material. For example, ch. 3 repeats the advice and instructions found in ch. 1 regarding disabling Windows' TCP/IP stack. Ch. 3 also gives virtually the same advice on assembling wireless equipment, including more screenshots of gear and discussions of NetStumbler found in ch. 2. All of this should have been consolidated.
I did not find the majority of screen captures in the various "installation" chapters helpful. Why take up 1/3 of a page with an essentially blank screen capture that only features the "su -" command? All similar information could have been presented as inline text. Many other screen captures offered fonts that were too small to show meaningful details. For example, many of the Kismet shots in ch. 6 are mostly blank screens with small text stuffed into the top or corners. The author should have resized his terminal with capturing the screen in mind.
Technically, I found the book accurate. I was not happy to see MAC defined as "machine access code" in the first half of the book and as "media access control" in ch. 10. (The second expansion is the norm, although Asante oddly uses the first.) Although the book covered Kismet, NetStumbler, and derivatives, it did not feature bsd-airtools or defensive measures like Snort-wireless.
Ch. 8, "Organizing WarDrives," was my favorite. While the majority of the book offered installation and configuration guides for networking equipment, ch. 8 provided original, helpful advice on conducting formal wardrives. It's one of the better pieces of "hacker history" I've seen in recent years. Ch. 8 alone supports the idea that wardriving is a legitimate activity not solely done by "black hats."
If you want to learn how to wardrive, this book will help you. The book could have been half as long and half as expensive if it had consolidated redundant material and replaced many screenshots with equally relevant text. Moving beyond advice on proper equipment configuration would take this book to the next level. Information on detecting and responding to disassociation attacks or simple unauthorized use of the network would be welcome in a second edition.
13 di 17 persone hanno trovato utile la seguente recensione
4.0 su 5 stelle Everything you need in one place - no searching the net 8 giugno 2004
Di Harold McFarland - Pubblicato su Amazon.com
Formato:Copertina flessibile
This book literally contains everything you might need to know to successfully engage in WarDriving. Starting from the most basic setup of homemade components to purchase and use of commercial ones it is one of the most thorough books available today on the subject. The authors wisely start out the book with defining what WarDriving is and what it is not. They define WarDriving as moving around a specific area and mapping the wireless access points for statistical purposes. It does not include actually accessing these points without prior permission. As such, the purpose of WarDriving is to raise awareness of the security issues related to wireless networks.
The first section of the book covers setting up both a laptop and a PDA for WarDriving purposes. This includes important general concepts like antenna types and their advantages and disadvantages, and connecting antenna to a wireless NIC. It also includes very specific information like specific NIC cards that work well and are conducive to the connection of external antennas and the like.
Once your hardware is set up you have to turn your attention to appropriate software. The authors detail both Windows and Linux software (free and commercial products) available to discover access points. It includes how to use NetStumbler, MiniStumbler, and Kismet to locate wireless LANs, the various options, and how to interpret the results. These are very detailed chapters and explain both the concepts and actual product use very well. Each of these chapters ends with additional software available to actually map the access points.
The final section of the book covers the details of attacking wireless networks. It includes information on finding cloaked points, hijacking, man-in-the-middle attacks, defeating MAC address filtering, and even attacking encrypted networks. In addition they include the details of enabling security on several specific models of Linksys and D-Link access points. The last part of the book covers advanced security information including configuring WiFi Protected Access, Wireless Gateway, VPN setup, RADIUS, and LEAP.
This is clearly one of the best books available on the subject of WarDriving. It provides a thorough examination of the subject, detailed explanations and instructions, and pretty much everything you need to know in this area. "WarDriving, Drive, Detect, Defend" is a very highly recommended book for anyone interested in wardriving.
10 di 13 persone hanno trovato utile la seguente recensione
4.0 su 5 stelle No WarChalking! 7 maggio 2004
Di W Boudville - Pubblicato su Amazon.com
Formato:Copertina flessibile
WarDriving is a (sub)cultural phenomenon that has emerged with the rapid growth in WiFi networks. As these have increasingly been adopted by the great unwashed, the vendors have gone to great lengths to simplify the WiFi access setup. Often, this has led to people turning off any encryption, and choosing the vendor's default settings, including for passwords. Hence, as the author points out, some hackers use their computers in cars and cruise around a city, looking for any open access points.
This book has two audiences. The first is those who want to WarDrive. Here, you find all necessary nuts and bolts information about configuring your computer, be it running MS Windows or Linux. Plus descriptions of antennas. Enough to get you up and running, or driving, as the case probably is. You should find it quite facile, if you follow the book's guidelines.
The other audience is those of you running a WiFi net, or planning to. By squinting a little at the text, you get simple and effective advice on preventing unwanted access.
Did I say 2 audiences? There is a third, which may have some intersection with the others. Suppose you just want to learn more about WarDriving, perhaps out of pure curiosity. This book is ideal for that. The author is the organiser of the first 3 WWWarDrives. Well qualified to expound on this subject. The chapter on WWWarDrives will be good in later years, from a historical viewpoint.
As a bonus, Hurley "exposes" WarChalking. This is a meme that spread widely in 2002. Hurley claims that amongst actual WarDrivers, few actually do this. Basically, WarChalking is a cute, easy to understand idea, especially because it is so visual. Which undoubtedly helped the general media latch onto it and spread it.
8 di 10 persone hanno trovato utile la seguente recensione
5.0 su 5 stelle Outstanding Reference for the True Wardriver 23 maggio 2004
Di James Norton - Pubblicato su Amazon.com
Formato:Copertina flessibile
If you are looking for something to help you break into other peoples wireless networks, look somewhere else. This is the first book I have read about wireless security that doesn't fall into the trap of trying to scare people. Instead, the authors methodically show you how to secure your wireless network. The authors also present a wealth of information on the tools used by the true Wardriver. If you are not a linux guru but want to use Kismet, this book is for you. If you want to learn to use the latest version of Netstumbler, it's in there. Plus, the history of organized Wardriving chapter is one of the coolest I have ever read. If these things are important to you, buy this book. It's great.

Ricerca articoli simili per categoria