19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

162<br />

Part III: Hacking Network Hosts<br />

Figure 9-2:<br />

Searching<br />

for your<br />

wireless<br />

APs using<br />

the WiGLE<br />

database.<br />

If your AP is listed, someone has discovered it — most likely via wardriving<br />

— and has posted the information for others to see. You need to<br />

start implementing the security countermeasures listed in this chapter<br />

as soon as possible to keep others from using this information against<br />

you! There are numerous Wi-Fi “locator” apps for mobile devices as well.<br />

Scanning your local airwaves<br />

Monitor the airwaves around your building to see what authorized and unauthorized<br />

APs you can find. You’re looking for the SSID (service set identifier),<br />

which is your wireless network name. If you have multiple and separate wireless<br />

networks, each one may or may not have a unique SSID associated with it.<br />

Here’s where the freebie tool NetStumbler (www.netstumbler.com/<br />

downloads) comes into play. NetStumbler can discover SSIDs and other<br />

detailed information about wireless APs, including the following:<br />

✓ MAC address<br />

✓ Name<br />

✓ Radio channel in use

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!