REVIEW: "WarDriving: Drive, Detect, Defend", Chris Hurley/Frank Thornton/Michael Puchol

Discussion in 'Computer Security' started by Rob Slade, doting grandpa of Ryan and Trevor, Nov 11, 2004.

  1. BKWARDRV.RVW 20040823

    "WarDriving: Drive, Detect, Defend", Chris Hurley/Frank
    Thornton/Michael Puchol, 2004, 1-931836-03-5, U$49.95/C$69.95
    %A Chris Hurley
    %A Frank Thornton
    %A Michael Puchol
    %C 800 Hingham Street, Rockland, MA 02370
    %D 2004
    %G 1-931836-03-5
    %I Syngress Media, Inc.
    %O U$49.95/C$69.95 781-681-5151 fax: 781-681-3585 www.syngress.com
    %O http://www.amazon.com/exec/obidos/ASIN/1931836035/robsladesinterne
    http://www.amazon.co.uk/exec/obidos/ASIN/1931836035/robsladesinte-21
    %O http://www.amazon.ca/exec/obidos/ASIN/1931836035/robsladesin03-20
    %P 495 p.
    %T "WarDriving: Drive, Detect, Defend"

    Chapter one is an introduction to the concept, with a discussion of
    required components, and the relevant characteristics thereof.
    Installing NetStumbler is described in chapter two, with operating
    instructions in three (which also repeats some of the earlier advice
    on component choice). Kismet installation is detailed for Slackware
    in chapter four, Fedora in five, and the operations are listed in six.
    Screenshots of using StumbVerter (and Microsoft MapPoint) or DiGLE to
    produce maps with the data previously obtained are shown in chapter
    seven.

    Chapter eight describes, in detail, how to organize your own
    wardriving contest (including an eight page Perl script for scoring
    results). Simple means of attacking and connecting to wireless
    networks are given in chapter nine. Screenshots of dialogue boxes for
    enabling basic security features on the major wireless routers are
    listed in chapter ten. Some features providing more advanced security
    are discussed in chapter eleven.

    The material provided in the book is clear, and will provide you with
    enough information to start wardriving and connecting to other
    networks. The content is fairly rudimentary, though, without the
    background information of a work like "Wireless Hacks" (cf.
    BKWLSHCK.RVW), by Rob Flickenger, which would allow the reader to go
    further in both understanding the technology and defending wireless
    networks.

    copyright Robert M. Slade, 2004 BKWARDRV.RVW 20040823

    --
    ======================

    ============= for back issues:
    [Base URL] site http://victoria.tc.ca/techrev/
    or mirror http://sun.soci.niu.edu/~rslade/
    CISSP refs: [Base URL]mnbksccd.htm
    Security Dict.: [Base URL]secgloss.htm
    Book reviews: [Base URL]mnbk.htm
    Review mailing list: send mail to
    or
     
    Rob Slade, doting grandpa of Ryan and Trevor, Nov 11, 2004
    #1
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.