19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

160<br />

Part III: Hacking Network Hosts<br />

Most of the tests I outline in this chapter require only Windows-based utilities.<br />

My favorite tools for assessing wireless networks in Windows are as follows:<br />

✓ Aircrack-ng (http://aircrack-ng.org)<br />

✓ CommView for WiFi (www.tamos.com/products/commwifi)<br />

✓ Elcomsoft Wireless Security Auditor (www.elcomsoft.com/ewsa.html)<br />

✓ OmniPeek (www.wildpackets.com/products/omnipeek_network_<br />

analyzer)<br />

You can also use a handheld wireless security testing device, such as the<br />

handy Digital Hotspotter by Canary Wireless (www.canarywireless.com)<br />

and even your Android-based phone or tablet with apps such as WiEye or WiFi<br />

Scanner. Apple, in its never-ending quest to protect itself from us and us from<br />

ourselves, no longer permits wireless scanning using iOS-based devices.<br />

An external antenna is also something to consider as part of your arsenal. I<br />

have had good luck running tests without an antenna, but your mileage may<br />

vary. If you’re performing a walkthrough of your facilities to test for wireless<br />

signals, for example, using an additional antenna increases your odds of finding<br />

both legitimate and (more important) unauthorized wireless systems.<br />

You can choose among three types of wireless antennas:<br />

✓ Omnidirectional: Transmits and receives wireless signals in 360 degrees<br />

over shorter distances, such as in boardrooms or reception areas. These<br />

antennas, also known as dipoles, typically come installed on APs from<br />

the factory.<br />

✓ Semidirectional: Transmits and receives directionally focused wireless<br />

signals over medium distances, such as down corridors and across one<br />

side of an office or building.<br />

✓ Directional: Transmits and receives highly focused wireless signals over<br />

long distances, such as between buildings. This antenna, also known as<br />

a high-gain antenna, is the antenna of choice for wireless hackers driving<br />

around cities looking for vulnerable APs — an act known as wardriving.<br />

As an alternative to the antennas described in the preceding list, you can use<br />

a nifty can design — called a cantenna — made from a Pringles, coffee, or<br />

pork-and-beans can. If you’re interested in trying this, check out the article at<br />

www.turnpoint.net/wireless/has.html for details. A simple Internet<br />

search turns up a lot of information on this subject, if you’re interested. One<br />

site in particular (www.cantenna.com) sells the Super Cantenna kit which<br />

has worked well for me.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!